• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۵۲ پاسخ غیر تکراری از ۵۲ پاسخ تکراری در مدت زمان ۰,۵۹ ثانیه یافت شد.

1. Advances in Cryptology - CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2004 : Proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Matt Franklin

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3152

2. Advances in cryptology--CRYPTO 2004

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Matt Franklin (ed.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security, Congresses,Computers, Access control, Congresses,Cryptography, Congresses

Classification :
QA76
.
9
.
A25
,
C79
2004

3. Advances of DNA computing in cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

Classification :

4. Applied public key infrastructure :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Jianying Zhou [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
I558
2005eb

5. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Oppliger, Rolf

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography

Classification :
TK
5105
.
59
.
O62

6. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Oppliger, Rolf.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography

Classification :
TK
5105
.
59
.
O77
1996

7. Crypto :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steven Levy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.

Classification :
QA76
.
9
.
A25
L49
2001eb

8. Cryptology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Richard Klima, Neil Sigmon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science),Ciphers.,COMPUTERS / Security / Cryptography.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science)

Classification :
TK5102
.
94

9. Data-driven block ciphers for fast telecommunication systems /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Nikolay A. Moldovyan, Alexander A. Moldovyan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers.,Computer security.,Cryptography.,Ciphers.,Ciphers.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.,Cryptography.

Classification :
QA76
.
9
.
A25
M664
2008eb

10. Data hiding fundamentals and applications :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.

Classification :
QA76
.
H877
2004

11. Electromagnetic information leakage and countermeasure technique /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Taikang Liu and Yongmei Li ; translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Computer security.,COMPUTERS-- Security-- Cryptography.

Classification :
QA76
.
9
.
A25
L58
2019eb

12. Emerging security algorithms and techniques /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
E466
2019eb

13. Formal correctness of security protocols

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bella, Giampaolo

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures

Classification :
QA
76
.
9
.
A25
.
B44
2007

14. Handbook of Image-based Security Techniques /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.

Classification :
QA76
.
9
.
A25

15. Internet and intranet security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Lech Janczewski

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography

Classification :
TK5105
.
875
.
I57
,
J358
2000

16. #Internet and intranet security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)

Author: #Lech Janczewski

Library: Central Library of Esfehan University of Technology (Esfahan)

Subject: Internet- Security measures ،Intranets )Computer networks(- Security measures ،Computers- Access control ،Cryptography

Classification :
#
TK
،#.
I57
,
J358

17. Internet and intranet security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Lech Janczewski

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography

Classification :
E-BOOK

18. Locally decodable codes and private information retrieval schemes /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sergey Yekhanin.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll

Classification :
QA76
.
9
.
A25
Y45
2010eb

19. PKI :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Andrew Nash [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur

Classification :
QA76
.
9
.
A25
P59
2001eb

20. Progress in cryptology--AFRICACRYPT 2009 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bart Preneel (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie

Classification :
QA76
.
9
.
A25
I58
2009
  • »
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival