241. Guide to elliptic curve cryptography /
Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Public key cryptography
Classification :
QA76
.
9
.
A25
H37
2003


242. Guide to elliptic curve cryptography
Author: / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Public key cryptography
Classification :
QA76
.
9
.
A25
,
H37
2003


243. Guide to elliptic curve cryptography /
Author: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes.,Hankerson, Darrel R.
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security.,Public key cryptography.
Classification :
QA76
.
9
.
A25
H37
2003


244. #Guide to elliptic curve cryptography
Author: #Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Public key cryptography
Classification :
#
QA
،#.
A25H37
،#
2010


245. Guide to elliptic curve cryptography
Author: Hankerson, Darrel R.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25H26


246. Guide to elliptic curve cryptography
Author: / Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Public key cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
H37
,
2003


247. Guide to elliptic curve cryptography ]electronic resources[
Author: Hankerson, Darrel R.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
H37
2003


248. Handbook of Image-based Security Techniques /
Author: Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.
Classification :
QA76
.
9
.
A25


249. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010


250. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010


251. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
C598
2003


252. Hiding in plain sight :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer networks ; Security measures ;

253. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C598
,
2003


254. Hiding in plain sight
Author: / Eric Cole
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography,Computer networks, Security measures
Classification :
QA76
.
9
.
A25C598
2003


255. INDOCRYPT 2006-Progress in Cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ;

256. Information hidin
Author: / Teddy Furon ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data protection--Congresses,Cryptography--Congresses

257. Information hiding : First International Workshop, Cambridge, U.K. May 30-June 1,1996 : proceedings
Author: Ross Anderson )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1174


258. Information hiding: First International Workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security-- Congresses,، Data protection-- Congresses,، Cryptography-- Congresses
Classification :
QA
76
.
9
.
A25
.
I5414
1996


259. Information security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Data protection,Computer viruses,Cryptography
Classification :
QA
76
.
9
.
I5
2004


260. Information security: a practical approach
Author: Bhaskar, S. M.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Public key cryptography
Classification :
QA
76
.
9
.
A25
B473
2008

