• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۶ پاسخ غیر تکراری از ۶ پاسخ تکراری در مدت زمان ۰,۷۲ ثانیه یافت شد.

1. Cryptanalytic attacks on RSA

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Yan, Song Y.

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography

Classification :
QA
76
.
9
.
A25
Y34

2. Cryptanalytic attacks on RSA

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Song Y. Yan

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.

Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007

3. Cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by William Stallings

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography

Classification :
TK5105
.
59
.
S713
2008

4. Introduction to certificateless cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
X75
2017

5. Public key infrastructures, services and applications

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Fabio Martinelli, Bart Preneel (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

Classification :

6. RSA Security's official guide to cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Steve Burnett and Stephen Paine

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography

Classification :
E-BOOK
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival