• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۴۶۹ پاسخ غیر تکراری از ۴۸۰ پاسخ تکراری در مدت زمان ۰,۲۷ ثانیه یافت شد.

221. Elliptic curves and their applications to cryptography : an introduction

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Enge, Andreas

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Cryptography,، Curves, Elliptic

Classification :
QA
76
.
9
.
A25E54

222. #Elliptic curves in cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)

Author: #I.F. Blake, G. Seroussi, and N.P. Smart

Library: Central Library of Esfehan University of Technology (Esfahan)

Subject: Computer security ،Cryptography ،Curves, Elliptic- Data processing

Classification :
#
QA
،#.
A25
,
B57

223. Elliptic curves in cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: I. F. Blake, G. Seroussi, N. P. Smart

Library: Central library and Documentation Center (Zanjan)

Subject: ، Computer security,، Cryptography,، Curve, Elliptic - Data processing

Classification :
QA
76
.
9
.
A25
B27
1999

224. Elliptic curves in cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: I.F. Blake, G. Seroussi, N.P. Smart

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Cryptography,Curves, Elliptic-- Data processing,clé publique,courbe elliptique,cryptographie

Classification :
QA76
.
9
.
A25
B57
1999

225. Emerging security algorithms and techniques /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
E466
2019eb

226. Error-correcting codes, finite geometries and cryptography : Conference on Error-Control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Aiden A. Bruen, David L. Wehlau, editors

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Cryptography

Classification :
QA
76
.
9
.
A25C63
2007

227. Error-correcting codes, finite geometries, and cryptography: Conference on Error-control Codes, Information Theory, and Applied Cryptography, December 5-6, 2007, Fields Institute, Toronto, Ontario, Canada : Canadian Mathematical Society Special Session on Error Control Codes, Information Theory, and Applied Cryptography, Dec 8-10, 2007, CMS Winter Meeting, London, Ontario, Canada

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Computer security,Congresses ، Cryptography

Classification :
QA
76
.
9
.
A25
.
C6675
2007

228. Formal correctness of security protocols

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bella, Giampaolo

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures

Classification :
QA
76
.
9
.
A25
.
B44
2007

229. Foundations and applications of security analysis

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ; Formal methods (Computer science) ; Congresses. ; Cryptography ; Congresses. ;

Classification :

230. Foundations and applications of security analysis

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Pierpaolo Degano, Luca Vigan?o (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Congresses,Formal methods (Computer science)--Congresses,Cryptography--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
J65
,
2009

231. Foundations of cryptograph

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Oded Goldreich

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Cryptography.,Computational complexity.

Classification :
QA
,
76
.
9
,.
A25
,
G635
,
2005

232. Foundations of cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Oded Goldreich

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Cryptography,Computational complexity

Classification :
QA76
.
9
.
A25
,
G635
2005

233. Fundamentals of computer security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Josef Pieprzyk

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security,Cryptography

Classification :
QA
،
76
.
9
،.
A25
,
P536
،
2003

234. Fundamentals of computer security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Josef Pieprzyk, Thomas Hardjomo, Jennifer Seberry.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.

Classification :
QA76
.
9
.
A25
J674
2010

235. Fundamentals of computer security /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Josef Pieprzyk

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Cryptography,Computer security,Cryptography

Classification :
QA76
.
9
.
A25
P536
2003

236. Fundamentals of computer security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Pieprzyk, Josef

Library: Central Library and Documentation Center (Semnan)

Subject: ، Computer security,، Cryptography

Classification :
QA
76
.
9
.
A25P536
2003

237. Fundamentals of computer security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Josef Pieprzyk

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: Computer security,Cryptography

Classification :
QA
76
.
9
.
A25P536
2003

238. Guide to Elliptic Curve Cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer security.,Public key cryptography.

Classification :
QA76
.
9
.
A25
H37
2003
E-book
,

239. Guide to elliptic curve cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Public key cryptography ;

Classification :

240. Guide to elliptic curve cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Public key cryptography

Classification :
QA76
.
9
.
A25
H37
2003
  • »
  • 24
  • 23
  • 22
  • 21
  • 20
  • ...
  • 16
  • 15
  • 14
  • 13
  • 12
  • 11
  • 10
  • 9
  • 8
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival