1. ......................
Author: Pfleeger, Charles P.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data protection,، Privacy, Right of
Classification :
QA
76
.
9
.
A25
P45
1997


2. DRM '05 : proceedings of the Fifth ACM Workshop on Digital Rights Management, November 7, 2005, Alexandria, Virginia, USA )co-located with CCS 2005(
Author: Rei Safavi-Naini & Moti Yung, editors; sponsored by ACM Special Interest Group on Security, Audit & Control )SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection
Classification :
QA
76
.
9
.
A25A323
2005


3. DRM 2003 : proceedings of the Third ACM Workshop on Digital Rights Management : Washington, DC, USA
Author: edited by Moti Yung; sponsored by ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection
Classification :
QA
76
.
9
.
A25A323
2003


4. Digital rights management
Author: / Joan Feigenbaum (ed.)
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Congresses,Privacy, Right of Congresses,Data protection Congresses
Classification :
QA76
.
9
.
A25
,
A345
2002


5. Digital rights management
Author: / Joan Feigenbaum (ed.)
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Congresses,Privacy, Right of Congresses,Data protection Congresses
Classification :
QA76
.
9
.
A25
,
A345
2002


6. Digital rights management : ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002 : revised papers
Author: Joan Feigenbaum )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
2696


7. Information assurance and security ethics in complex systems
Author: / [edited by]Melissa Jane Dar
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Data protection,Privacy, Right of,Information technology, Security measures
Classification :
QA76
.
9
.
I5
2011


8. Information security and privacy
Author: / Josef Pieprzyk, Hossein Ghodosi, Ed. Dawson (Eds.)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers -- Access control -- Congresses,Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A251


9. Information security and privacy : First Australasian Conference, ACISP'96, wollongong, NSW, Australia, June 24-26, 1996 : proceedings
Author: Josef Pieprzyk, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1172


10. Information security and privacy : Second Australian Conference,ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings
Author: Vijay Varadharajan, Josef Pieprzyk, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1270


11. Information security and privacy : Third Australasian Conference, ACISP'98, Brisbane, Australia, July 13-15, 1998 : proceedings
Author: Colin Boyd, Ed Dawson, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1438


12. Information security and privacy : 5th Australasian Conference, ACISP'2000, Brisbane, Australia, July 10-12, 2000 : proceedings
Author: Ed Dawson, Andrew Clark, Colin Boyd )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1841


13. Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
Author: Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
3108


14. Information security and privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
Author: Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1587


15. Information security and privacy; 13th Australasian conference, ACISP 2008, Wollongong Australia, July 7-9, 2008 proceedings
Author: / [edited by] Yi Mu, Willy Susilo, Jennifer Seberry,ACISP (2008:13th: Wollongong)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A25A279
2008


16. Information security and privacy : 6th Australian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings
Author: Vijay Varadharajan, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
2119


17. Privacy and anonymity in information management systems
Author: / Jordi Nin, Javier Herranz, editors
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security,Data protection,Electronic information resources, Access control,Privacy, Right of
Classification :
QA76
.
9
.
A25
,
P747
2010


18. Privacy and anonymity in information management systems. new techniques for new practical problems
Author: Jordi Nin, Javier Herranz, editors
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection,، Electronic information resources- Access control,، Privacy, Right of
Classification :
QA
76
.
9
.
A25P747
2010


19. Privacy protection for e-services
Author: George Yee, ]editor[
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce , Security measures,، Computer security,، Data protection,، Privacy, Right of,، Electronic books. , lcsh
Classification :
HF
5548
.
37
.
P753
2006eb


20. Privacy protection for e-services
Author: / [edited by] George Yee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic commerce- Security measures,Computer security,Data protection,Privacy, Right of
Classification :
HF5548
.
37
.
P75
2006

