• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۴۶۹ پاسخ غیر تکراری از ۴۸۰ پاسخ تکراری در مدت زمان ۰,۲۵ ثانیه یافت شد.

201. Decrypted secrets

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Cryptography. ;

Classification :

202. Decrypted secrets :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Friedrich L. Bauer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Sécurité informatique -- Congrès.

Classification :
QA76
.
9
.
A25
F754
1997

203. Decrypted secrets

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Friedrich L. Bauer

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Cryptography.

Classification :
QA
,
76
.
9
,.
A25
,
B38513
,
2007

204. Decrypted secrets: methds and maxims of cryptology

پدیدآورنده : Bauer, Friedrich Ludwig

موضوع : ، Computer security,، Cryptography

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

205. Decrypted secrets : methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bauer, Friedrich Ludwig

Library: Central library and information center (Khorasan Razavi)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25
B38513
2000

206. Decrypted secrets : methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bauer, Friedrich Ludwig

Library: Central Library and Documentation Center (Kerman)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25
B38
2002

207. Decrypted secrets: methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Friedrich L. Bauer.

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Computer security,Cryptography

Classification :
652
.
8
B344D
1997
21

208. Decrypted secrets : methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bauer, Friedrich Ludwig

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security - Congresses , Cryptography - Congresses

Classification :
QA
76
.
9
.
A25
B38513
1997

209. Decrypted secrets : methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bauer, Friedrich Ludwig, 4291-

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25B313
2000

210. Decrypted secrets: methods and maxims of cryptology,Entzifferte Geheimnisse. English

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bauer, Friedrich Ludwig

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Computer security,Congresses ، Cryptography

Classification :
QA
76
.
9
.
A25
.
B38513
1997

211. Digital signature: networ security practices

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Gupta, Kailash N.

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,، Signatures )Writing(,، Cryptography

Classification :
QA
76
.
9
.
A25
G86

212. Digital signature schemes

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Birgit Pfitzmann

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Signatures (Writing),Cryptography.

Classification :
QA
,
76
.
9
,.
A25
,
P444
,
1996

213. Digital signature schemes :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Signatures (Writing) ; Cryptography ;

Classification :

214. Digital signature schemes : general framework and fail-stop signatures

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Pfitzmann, Birgit

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Signatures )Writing(,، Cryptography

Classification :
QA
76
.
L28
Vol
.
1100

215. Disappearing cryptograph

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Peter Wayner

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Cryptography.,Internet.

Classification :
TK
,
5105
.
59
,.
W39
,
2009

216. Disappearing cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Peter Wayner

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Cryptography,Internet

Classification :
TK5105
.
59
.
W39
2009

217. Disappearing cryptography: information hiding: steganography & watermarking

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wayner, Peter

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Computer networks,، Cryptography,، Internet

Classification :
TK
5105
.
59
.
W39
2002

218. Dynamic secrets in communication security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Xiao, Sheng,Sheng Xiao, Weibo Gong, Don Towsley

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography

Classification :
QA76
.
9
.
A25

219. Electromagnetic information leakage and countermeasure technique /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Taikang Liu and Yongmei Li ; translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Computer security.,COMPUTERS-- Security-- Cryptography.

Classification :
QA76
.
9
.
A25
L58
2019eb

220. Elliptic curves and their applications to cryptography :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Andreas Enge.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Curves, Elliptic.

Classification :
  • »
  • 24
  • 23
  • 22
  • 21
  • 20
  • ...
  • 15
  • 14
  • 13
  • 12
  • 11
  • 10
  • 9
  • 8
  • 7
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival