61. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

62. Public Key Cryptography ђ́أ PKC 2012
Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

63. RFID Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Engineering. ; Computer Communication Networks. ; Data encryption (Computer science). ; Electronics. ; Telecommunication. ; Systems engineering. ; Engineering. ; Circuits and Systems. ; Signal, Image and Speech Processing. ; Communications Engineering, Ne

64. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


65. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

66. Security and Privacy \U+2013\ Silver Linings in the Cloud
Author: edited by Kai Rannenberg, Vijay Varadharajan, Christian Weber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

67. Security and Privacy in Mobile Information and Communication Systems
Author: edited by Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

68. Security and Trust Management
Author: edited by Catherine Meadows, Carmen Fernandez-Gago
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

69. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


70. Security and privacy in communication networks
Author: / Muttukrishnan Rajarajan ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication systems--Security measures--Congresses,Computer networks--Security measures--Congresses,Data encryption (Computer science)--Congresses
Classification :
TK5102
.
85
.
S43
2012


71. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


72. Security of information and communication networks
Author: / Stamatios V. Kartalopoulos
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science)
Classification :
TK
5105
.
59
.
K37
2009


73. Security of information and communication networks
Author: / Stamatios V Kartalopoulos
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Reseaux d'ordinateurs -- Securite -- Mesures.,Reseaux d'information -- Securite? -- Mesures.
Classification :
TK
5105
.
59
.
K3
2009


74. Security of information and communication networks
Author: Kartalopoulos, Stamatios V.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks ► Data encryption (Computer science)
Classification :
K18s

75. Smart card research and advanced applications :
Author: Emmanuel Prouff (edition)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Smart cards, Congresses
Classification :
TK7895
.
S62
C37
2011


76. The Handbook of Data Communications and Networks :
Author: by W.J. Buchanan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Operating systems (Computers)
Classification :
TK5105
.
B995
2004


77. The internet book :
Author: Douglas E. Comer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internet.,World Wide Web.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet.,World Wide Web.
Classification :
TK5105
.
875
.
I57
I58
2019


78. Topics in cryptology -- CT-RSA 2019 :
Author: Mitsuru Matsui (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


79. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


80. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013

