21. Lightweight Cryptography for Security and Privacy
Author: \ Thomas Eisenbarth, Erdinç Öztürk (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encyrption (Computer science) -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
L5
2015
E-Book
,


22. Mobile, Secure, and Programmable Networking :
Author: Éric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Mobile computing, Congresses.,Computer networks.,Mobile computing.
Classification :
TK5105
.
5
.
M76
2019


23. Network and system security :
Author: Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer security.
Classification :
QA76
.
9
.
A25


24. Proceedings of International Ethical Hacking Conference 2018 :
Author: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


25. Progress in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;

26. Progress in cryptology
Author: / Ed Dawson, Serge Vaudenay (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005


27. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


28. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Author: Ed Dawson, Serge Vaudenay )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia
Classification :
QA
76
.
L28
Vol
.
3715


29. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


30. Public-Key Cryptography - PKC 2013 :
Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.
Classification :
QA76
.
9
.
A25
E358
2013


31. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


32. Security in computing and communications :
Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


33. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25

