1. Advances in Cryptology - CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2004 : Proceedings
Author: Matt Franklin
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3152


2. Advances in cryptology--CRYPTO 2004
Author: / Matt Franklin (ed.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computers, Access control, Congresses,Cryptography, Congresses
Classification :
QA76
.
9
.
A25
,
C79
2004


3. Advances of DNA computing in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

4. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


5. Authentication systems for secure networks
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


6. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


7. Crypto :
Author: Steven Levy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.
Classification :
QA76
.
9
.
A25
L49
2001eb


8. Cryptology :
Author: Richard Klima, Neil Sigmon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science),Ciphers.,COMPUTERS / Security / Cryptography.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science)
Classification :
TK5102
.
94


9. Data-driven block ciphers for fast telecommunication systems /
Author: Nikolay A. Moldovyan, Alexander A. Moldovyan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers.,Computer security.,Cryptography.,Ciphers.,Ciphers.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.,Cryptography.
Classification :
QA76
.
9
.
A25
M664
2008eb


10. Data hiding fundamentals and applications :
Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.
Classification :
QA76
.
H877
2004


11. Electromagnetic information leakage and countermeasure technique /
Author: Taikang Liu and Yongmei Li ; translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.,COMPUTERS-- Security-- Cryptography.
Classification :
QA76
.
9
.
A25
L58
2019eb


12. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


13. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007


14. Handbook of Image-based Security Techniques /
Author: Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.
Classification :
QA76
.
9
.
A25


15. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
TK5105
.
875
.
I57
,
J358
2000


16. #Internet and intranet security management
Author: #Lech Janczewski
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Internet- Security measures ،Intranets )Computer networks(- Security measures ،Computers- Access control ،Cryptography
Classification :
#
TK
،#.
I57
,
J358


17. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
E-BOOK

18. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb


19. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


20. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009

