• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۲ پاسخ غیر تکراری از ۱۲ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

1. Applied Cryptography and Network Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره‌ها,رمزگذاری داده‌ها -- کنگره‌ها,رمزنگاری -- کنگره‌ها

Classification :
E-Book
,

2. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Jonathan Katz, Moti Yung (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
TK5102
.
94
.
A28
2007
E-Book
,

3. Applied cryptography and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / John Ioannidis, Angelos Keromytis, Moti Yung (eds.)

Library: Library of College of Science University of Tehran (Tehran)

Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses

Classification :
TK
5102
.
85
.
A26
2005

4. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3089

5. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
3531

6. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
2846

7. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Steven M. Bellovin ... ]et al.[ )eds.(

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography

Classification :
TK
5102
.
94
.
A28

8. Chaos synchronization and cryptography for secure communications: applications for encryption

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: ]edited by[ Santo Banerjee

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Telecommunication,، Chaotic behavior in systems,، Cryptography,، Data encryption )Computer science(,، Synchronization

Classification :
TK
5102
.
94
.
C523

9. Cryptography and secure communication

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Blahut, Richard E.

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Telecommunication

Classification :
QA
76
.
9
.
A25
.
B569

10. Innovative cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Data encryption (Computer science) ; Telecommunication ; Security measures. ; Cryptography. ;

Classification :

11. Innovative cryptography /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Nick Moldovyan, Alex Moldovyan

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography,Data encryption (Computer science),Telecommunication-- Security measures

Classification :
QA76
.
9
.
A25
M665
2007

12. Innovative cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Nick Moldovyan, Alex Moldovyan

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Data encryption (Computer science),Telecommunication--Security measures,Cryptography.

Classification :
QA
,
76
.
9
,.
A25
,
M665
,
2007
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival