21. Dynamic secrets in communication security
Author: Xiao, Sheng,Sheng Xiao, Weibo Gong, Don Towsley
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA76
.
9
.
A25


22. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


23. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010


24. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010


25. Information security and cryptology :
Author: Xuejia Lai, Moti Yung, Dongdai Lin (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5525
2010eb


26. Information security and cryptology
Author: Feng Bao ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
76
.
O63


27. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.

28. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;

29. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb


30. Innovative cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Telecommunication ; Security measures. ; Cryptography. ;

31. Innovative cryptography /
Author: Nick Moldovyan, Alex Moldovyan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Telecommunication-- Security measures
Classification :
QA76
.
9
.
A25
M665
2007


32. Innovative cryptography
Author: / Nick Moldovyan, Alex Moldovyan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Telecommunication--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
M665
,
2007


33. Internet security
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57R447
2003

34. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003


35. Internet security
Author: / Man Young Rhee
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Internet --Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R4
2003


36. Internet security
Author: / Man Young Rhee
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
E-BOOK

37. Internet security
Author: / Man Young Rhee
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
,.
R447
2003


38. Internet security :cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Internet,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447


39. Internet security. cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.,Man Young Rhee
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Internet- Security measures,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447


40. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003
