• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۹ پاسخ غیر تکراری از ۹ پاسخ تکراری در مدت زمان ۰,۳۹ ثانیه یافت شد.

1. AFRICACRYPT 2019-Progress in Cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Computer Communication Networks. ; Computer science. ; Coding theory. ; Software engineering. ; Systems and Data Security. ;

Classification :

2. Broadband quantum cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Daniel J. Rogers

Library: Library of College of Science University of Tehran (Tehran)

Subject: Data encryption (Computer science),Cryptography,Broadband communication systems -- Security measures,Quantum communication

Classification :
QA
76
.
9
.
A25
R64
2010

3. Broadband quantum cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Daniel J. Rogers

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Broadband communication systems-- Security measures,Cryptography,Data encryption (Computer science),Quantum communication

Classification :
QA76
.
9
.
A25
R64
2010

4. Computational modeling of objects presented in images

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Reneta P. Barneva

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer science,، Computer communication systems,، Computer security

Classification :
QH
324
.
2
.
C53
2017

5. Inside Radio : An Attack and Defense Guide

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Qing Yang, Lin Huang

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer communication systems,، Computer science,، Computer security,، Data structures )Computer science(,، Electrical engineering,، Electronic circuits

Classification :
TK
6563
.
I68
2018

6. Introduction to Cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Hans Delfs and Helmut Knebl

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures

Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007

7. Quantum Cryptography-Post

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer science. ; Computer communication systems. ; Computer security. ; Data encryption (Computer science). ; Algorithms. ; Computer science ; Mathematics. ; Management information systems. ; Computer Science. ; Data Encryption. ; Computer Communicatio

Classification :

8. Security and Privacy in Communication Networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Robert Deng; Jian Weng; Kui Ren; Vinod Yegneswaran

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer science,، Computer communication systems,، Computer security

Classification :
TK
5103
.
2
.
S43
2017

9. Trustworthy execution on mobile devices

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks

Classification :
QA76
.
9
.
A25
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival