1. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


2. Advances in cryptology--ASIACRYPT ʹ96
Author: International Conference on the Theory and Applications of Cryptology and Information Security (1996 : Kyongju, Korea)
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security -- Congresses►Data protection -- Congresses►Cryptography- Congresses
Classification :
76
.
9
.
A25
,
I5553
1996

3. Advances in cryptology-Asiacrypt'98 : International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, 1998 : proceedings
Author: Kazuo Ohta, Dingyi Pei )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1514


4. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


5. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


6. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


7. Fifth World Conference on Information Security Education
Author: edited by Lynn Futcher, Ronald Dodge.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Study and teaching, Congresses.,Data protection-- Study and teaching, Congresses.

8. Financial cryptography and data security :
Author: Angelos D. Keromytis (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Informatique.

9. Foundations of security, protocols, and equational reasoning :
Author: Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols, Congresses.,Cryptography, Congresses.,Data protection, Congresses.,Logic design, Congresses.,Computer network protocols.,Cryptography.,Data protection.,Logic design.
Classification :
QA76
.
9
.
A25


10. Information Security Theory and Practice :
Author: edited by Olivier Blazy, Chan Yeob Yeun.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer systems-- Access control, Congresses.,Data protection, Congresses.,Mobile computing-- Security measures, Congresses.,Ubiquitous computing, Congresses.,Computer security.,Computer systems-- Access control.,Data protection.,Ubiquitous computing.
Classification :
QA76
.
9
.
A25
W57
2019


11. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


12. Information and communications security :
Author: David Naccache [and 7 more] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Telecommunication systems-- Security measures, Congresses.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Online Services-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Software Engineering.,Telecommunication systems-- Security measures.
Classification :
QA76
.
9
.
A25


13. Information hidin
Author: / Teddy Furon ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data protection--Congresses,Cryptography--Congresses

14. Information hiding: First International Workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security-- Congresses,، Data protection-- Congresses,، Cryptography-- Congresses
Classification :
QA
76
.
9
.
A25
.
I5414
1996


15. Information hiding : First International Workshop, Cambridge, U.K. May 30-June 1,1996 : proceedings
Author: Ross Anderson )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1174


16. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.

17. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;

18. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb


19. Information theoretic security :
Author: Serge Fehr (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I323
2011


20. International Conference on Computer Networks and Communication Technologies :
Author: S. Smys, Robert Bestak, Joy Iong-Zong Chen, Ivan Kotuliak, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Communications Engineering, Networks.,Information Systems Applications (incl. Internet).,Systems and Data Security.,Communications engineering-- telecommunications.,Computer networks.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information retrieval.
Classification :
TK5105
.
5

