21. Information security and privacy
Author: / Josef Pieprzyk, Hossein Ghodosi, Ed. Dawson (Eds.)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers -- Access control -- Congresses,Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A251


22. Information security and privacy : First Australasian Conference, ACISP'96, wollongong, NSW, Australia, June 24-26, 1996 : proceedings
Author: Josef Pieprzyk, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1172


23. Information security and privacy : Second Australian Conference,ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings
Author: Vijay Varadharajan, Josef Pieprzyk, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1270


24. Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
Author: Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
3108


25. Information security and privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
Author: Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1587


26. Information security : third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings
Author: Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control
Classification :
QA
76
.
L28
Vol
.
1975


27. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


28. 5, 2010. Proceedings- Track at the RSA Conference 2010, San Francisco, CA, USA, March 1ع۰ثRSA 2010: The Cryptographers- CT-Topics in Cryptology
Author: / Bart Preneel (auth.), Josef Pieprzyk (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK

29. RSA 2010- CT-Topics in Cryptology
Author: / Josef Pieprzyk
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK

30. RSA 2010- CT-Topics in Cryptology
Author: Josef Pieprzyk
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: EDUCATIONAL RESEARCH&EDUCATION
