• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۷۵ پاسخ غیر تکراری از ۷۵ پاسخ تکراری در مدت زمان ۰,۳۹ ثانیه یافت شد.

1. Advanced DPA theory and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Eric Peeters

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography,Data encryption (Computer science),Embedded computer systems-- Security measures

Classification :
TK7895
.
E42
P44
2013

2. Advances of DNA computing in cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;

Classification :

3. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره‌ها,رمزگذاری داده‌ها -- کنگره‌ها,رمزنگاری -- کنگره‌ها

Classification :
E-Book
,

4. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Jonathan Katz, Moti Yung (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
TK5102
.
94
.
A28
2007
E-Book
,

5. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / John Ioannidis, Angelos Keromytis, Moti Yung (eds.)

Library: Library of College of Science University of Tehran (Tehran)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses

Classification :
TK
5102
.
85
.
A26
2005

6. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3089

7. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3531

8. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
2846

9. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steven M. Bellovin ... ]et al.[ )eds.(

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
TK
5102
.
94
.
A28

10. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Ioannidis, angelos keromytis, moti Yung (eds)

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses

Classification :
TK
،
5102
.
85
،.
A26
،
2005

11. Broadband quantum cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Daniel J. Rogers

Library: Library of College of Science University of Tehran (Tehran)

Subject: Data encryption (Computer science),Cryptography,Broadband communication systems -- Security measures,Quantum communication

Classification :
QA
76
.
9
.
A25
R64
2010

12. Broadband quantum cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Daniel J. Rogers

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Broadband communication systems-- Security measures,Cryptography,Data encryption (Computer science),Quantum communication

Classification :
QA76
.
9
.
A25
R64
2010

13. Chaos synchronization and cryptography for secure communications: applications for encryption

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: ]edited by[ Santo Banerjee

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Telecommunication,، Chaotic behavior in systems,، Cryptography,، Data encryption )Computer science(,، Synchronization

Classification :
TK
5102
.
94
.
C523

14. Computer security and cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alan G. Konheim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)

Classification :
Z103
.
A2
K638
2007

15. Cryptanalytic attacks on RSA

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Yan, Song Y.

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography

Classification :
QA
76
.
9
.
A25
Y34

16. Cryptanalytic attacks on RSA

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Song Y. Yan

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.

Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007

17. Cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by William Stallings

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography

Classification :
TK5105
.
59
.
S713
2008

18. Cryptography and secure communication

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Blahut, Richard E.

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Telecommunication

Classification :
QA
76
.
9
.
A25
.
B569

19. Cryptology :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Richard Klima, Neil Sigmon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science),Ciphers.,COMPUTERS / Security / Cryptography.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science)

Classification :
TK5102
.
94

20. Data hiding fundamentals and applications :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.

Classification :
QA76
.
H877
2004
  • »
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival