441. Topics in cryptology, CT-RSA 2003 : the Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 2003 : proceedings
Author: Marc Joye )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2612


442. Topics in cryptology, CT-RSA 2001: the Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 2001: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
.
R753
2001


443. Topics in cryptology--CT-RSA 2004 : the Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004 : proceedings
Author: Tatsuaki Okamoto )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2964


444. Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings
Author: David Pointcheval )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3860


445. Topics in cryptology, CT-RSA 2002 : the cryptographers' Track at RSA conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
Author: Bart Preneel )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2271


446. Topics in cryptology -- CT-RSA 2005 : the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005 : proceedings
Author: Alfred Menezes )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3376


447. Towards hardware-intrinsic security
Author: / Ahmad-Reza Sadeghi, David Naccache
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer input-output equipment,Computer security,Cryptography
Classification :
TK
7887
.
5
.
T69
2010


448. Towards hardware-intrinsic security foundations and practice
Author: Sadeghi, Ahmad-Reza.,Ahmad-Reza Sadeghi, David Naccache ; foreword by Pim Tuyls
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Cryptography,، Computer input-output equipment
Classification :
QA
76
.
T6
S2
2010


449. Tribe of hackers red team :
Author: Marcus J Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.
Classification :
QA76
.
9
.
A25


450. Understanding and applying cryptography and data security
Author: Elbirt, Adam J.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25E38


451. Understanding Cryptography
Author: Christof Paar. Jan Pelzl
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA
,
76
.
9
,
U8P2
,
2010


452. Understanding public-key infrastructure: concepts, standards, and deployment considerations
Author: Adams, Carlisle
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,Standards ، Computers-- Access control,، Cryptography
Classification :
QA
76
.
9
.
A25
.
A347
1999


453. User's guide to cryptography and standards /
Author: Alexander W. Dent, Chris J. Mitchell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control-- Standards,Cryptography-- Standards
Classification :
QA76
.
9
.
A25
D465
2005


454. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography- Standards,Computers- Access control- Standards
Classification :
QA76
.
9
.
A25
,
D465
2005


455. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography, Standards,Computers, Access control, Standards
Classification :
QA76
.
9
.
A25D465
2005


456. based encryption-Introduction to identity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Public key cryptography. ; Public key infrastructure (Computer security) ;

457. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
,.
59
.
F672
2008


458. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
.
59
.
F672
2008


459. intrinsic security-Towards hardware
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: output equipment. ; Computer security. ; Cryptography. ; -Computer input

460. پدافند سایبری سامانه و شبکه کنترل صنعتی : (معماری، پروتکل ها، آسیب پذیری ها، تهدیدات، مخاطرات و راهکارهای مصون سازی سایبری)
Author: / تالیف و تصنیف علی ناصری,پشت جلد به انگلیسی: Ali Naseri. Cyber defense of industrial control system and network,ناصری
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: رمزگذاری دادهها,Data encryption (Computer science),رمزنگاری,Cryptography,کامپیوترها,Computer security,کامپیوترها,Computers,فضای مجازی,Cyberspace, -- رمزگان, -- Code words, -- ایمنی اطلاعات, -- کنترل دستیابی, -- Access control, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02,a03,a03,a04,a04,a05,a05
Classification :
QA
۷۶
/
۹
/
ر
۸
ن
۲ ۱۴۰۰

