• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۴۶۹ پاسخ غیر تکراری از ۴۸۰ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

61. Advances in elliptic curve cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,، Public key cryptography

Classification :
QA
76
.
9
.
A25
A375

62. Advances of DNA computing in cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

Classification :

63. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره‌ها,رمزگذاری داده‌ها -- کنگره‌ها,رمزنگاری -- کنگره‌ها

Classification :
E-Book
,

64. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Telecommunication--Security measures,Cryptography.,Cryptology

Classification :
QA
,
76
.
9
,.
A25
,
S35
,
1996

65. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security,Telecommunication--Security measure,Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

66. Applied cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Telecommunication- Security measures,Cryptography

Classification :
QA76
.
9
.
A25
,
S35
1994

67. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Jonathan Katz, Moti Yung (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
TK5102
.
94
.
A28
2007
E-Book
,

68. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / John Ioannidis, Angelos Keromytis, Moti Yung (eds.)

Library: Library of College of Science University of Tehran (Tehran)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses

Classification :
TK
5102
.
85
.
A26
2005

69. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3089

70. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3531

71. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
2846

72. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steven M. Bellovin ... ]et al.[ )eds.(

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
TK
5102
.
94
.
A28

73. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Ioannidis, angelos keromytis, moti Yung (eds)

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses

Classification :
TK
،
5102
.
85
،.
A26
،
2005

74. Applied cryptography : protocols, algorithms, and source code in C

پدیدآورنده : Schneier, Bruce

موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography

۲ نسخه از این کتاب در ۱ کتابخانه موجود است.

75. Applied cryptography : protocols, algorithms, and source code in C

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security, Telecommunication - Security measures, Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

76. Applied cryptography: protocols, algorithms, and source code in C

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Security measures ، Telecommunication,، Cryptography

Classification :
QA
76
.
9
.
A25
S35
1996

77. Applied cryptography: protocols, algorithms, and source code in C [electronic resource]

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bruce Schneier

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer security,Telecommunication--Security measures,Cryptography

Classification :
EB
,
QA76
.
9
.
A25
,
S35
1996

78. Applied cryptography :protocols, algorithms, and source code in C ruce Schneier

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Schneier, Bruce

Library: Central Library and Documentation Center (Semnan)

Subject: ، Computer security,، Telecommunicatio--Security measures,، Cryptography

Classification :
QA
76
.
9
.
A25S35
1996

79. Applied public key infrastructur

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / edited by Jianying Zhou ... [et al.]

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Public key infrastructure (Computer security)--Congresses,Public key cryptography--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
I558
,
2005eb

80. Applied public key infrastructure :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Jianying Zhou [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
I558
2005eb
  • »
  • 24
  • 23
  • 22
  • 21
  • 20
  • ...
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival