21. Cryptographic hardware and embedded systems--CHES 2001 : third international workshop, Paris, France, May 14-16, 2001 : proceedings
Author: Cetin K. Koc, David Naccache, Christof Paar )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Embedded computer systems,Congresses ، Cryptography,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
2162


22. Cryptographic hardware and embedded systems : First International Workshop, CHES'99, Worchester, MA, USA, August 1999 : proceedings
Author: Cetin K. koc, Christof Paar )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Embedded computer systems,Congresses ، Cryptography,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
1717


23. Financial cryptography and data security :
Author: Radu Sion (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Electronic commerce -- Security measures -- Congresses.,Electronic funds transfers -- Security measures -- Congresses.

24. New trends in computer technologies and applications :
Author: Chuan-Yu Chang, Chien-Chou Lin, Horng-Horng Lin (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic data processing, Congresses.,Self-organizing systems, Congresses.,Electronic data processing.,Self-organizing systems.
Classification :
QA75
.
5
.
I58
2018


25. Recent trends in computer applications :
Author: editors, Jihad Mohamad Alja'am, Abdulmotaleb El Saddik and Abdul Hamid Sadk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software, Congresses.,Computer science, Congresses.,Information technology, Congresses.,Application software.,Artificial intelligence.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Data mining.,Information retrieval.,Information technology.,Information technology: general issues.,Teaching skills & techniques.
Classification :
QA75
.
5


26. Secure IT systems :
Author: Nils Gruschka (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Ethical & social aspects of IT.,Information retrieval.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


27. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011

