2. Advances in cryptology -- ASIACRYPT 2018 :
Author: Thomas Peyrin, Steven Galbraith (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


3. Advances in cryptology -- EUROCRYPT 2018 :
Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


4. Advances in data and information sciences :
Author: Mohan L. Kolhe, Munesh C. Trivedi, Shailesh Tiwari, Vikash Kumar Singh, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer engineering, Congresses.,Software architecture, Congresses.,Artificial intelligence.,Computer engineering.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Software architecture.
Classification :
QA76
.
751


5. Codes, cryptology and information security :
Author: Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Internet-- Security measures, Congresses.,Computer security.,Data encryption (Computer science),Internet-- Security measures.
Classification :
QA76
.
9
.
A25


6. Coding and Cryptology :
Author: Yeow Meng Chee ... [and others (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory, Congresses,Cryptography, Congresses,Coding and Information Theory,Computer Science,Data Encryption,Discrete Mathematics in Computer Science
Classification :
QA268
.
I93
2011


7. Constructive side-channel analysis and secure design :
Author: edited by Junfeng Fan, Benedikt Gierlichs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Systems Architecture-- General.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Systems analysis & design.
Classification :
QA76
.
9
.
A25


8. Contemporary cryptology
Author: / Dario Catalano ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Coding theory--Congresses,Information theory--Congresses,Data encryption (Computer science)--Congresses
Classification :
QA
,
268
,.
A375
,
2005


9. Contemporary cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Coding theory ; Congresses. ; Information theory ; Congresses. ; Data encryption (Computer science) ; Congresses. ;

10. Cryptographic hardware and embedded systems--CHES 2011 :
Author: Bart Preneel, Tsuyoshi Takagi, (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Embedded computer systems-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
C44
2011


11. Cryptography and Coding
Author: \ Jens Groth (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Computer science,رمزگذاری دادهها,کامپیوتر, -- Congresses, -- کنگرهها,a04,a03,a04,a03
Classification :
QA
76
.
9
.
A25
I4
2015
E-Book
,


12. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


13. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


14. Information security and cryptology -- ICISC 2017 :
Author: Howon Kim, Dong-Chan Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


15. Intelligent, secure, and dependable systems in distributed and cloud environments :
Author: Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


16. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


17. Post-quantum cryptography :
Author: edited by Tanja Lange, Rainer Steinwandt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.
Classification :
QA76
.
9
.
A25


18. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


19. Topics in cryptology -- CT-RSA 2018 :
Author: Nigel P. Smart (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Hardware-- Network Hardware.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information architecture.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25

