1041. Topics in cryptology--CT-RSA 2004 : the Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004 : proceedings
Author: Tatsuaki Okamoto )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2964


1042. Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings
Author: David Pointcheval )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3860


1043. Topics in cryptology, CT-RSA 2002 : the cryptographers' Track at RSA conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
Author: Bart Preneel )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2271


1044. Topics in cryptology -- CT-RSA 2005 : the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005 : proceedings
Author: Alfred Menezes )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3376


1045. Towards hardware-intrinsic securit
Author: / Ahmad-Reza Sadeghi, David Naccache, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer input-output equipment.
Classification :
TK
,
7887
.
5
,.
T69
,
2010eb


1046. Towards hardware-intrinsic securit
Author: / Ahmad-Reza Sadeghi, David Naccache, editors
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer input-output equipment,Electronic books., local

1047. Towards hardware-intrinsic security :
Author: Ahmad-Reza Sadeghi, David Naccache, editors ; foreword by Pim Tuyls.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer input-output equipment.,Computer input-output equipment.,Informatique.
Classification :
TK7887
.
5
.
T69
2010eb


1048. Towards hardware-intrinsic security
Author: / Ahmad-Reza Sadeghi, David Naccache
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer input-output equipment,Computer security,Cryptography
Classification :
TK
7887
.
5
.
T69
2010


1049. Towards hardware-intrinsic security foundations and practice
Author: / Ahmad-Reza Sadeghi, David Naccache
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Cryptography,Computer input-output equipment
Classification :
QA76
.
T6S2
2010


1050. Towards the Internet of Things :
Author: Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.
Classification :
TK5105
.
8857


1051. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


1052. Tribe of hackers red team :
Author: Marcus J Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.
Classification :
QA76
.
9
.
A25


1053. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


1054. Ubiquitous communications and network computing :
Author: Navin Kumar, R. Venkatesha Prasad (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Computer science, Congresses.,Internet of things, Congresses.,Computer networks.,Computer science.,Internet of things.
Classification :
TK5105
.
5


1055. Understanding and applying cryptography and data security
Author: Elbirt, Adam J.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security. ► Cryptography.
Classification :
005
.
E37u


1056. Understanding and applying cryptography and data security
Author: Adam J. Elbirt
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25E38


1057. Understanding cryptography :
Author: by Christof Paar, Jan Pelzl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Informatique.
Classification :
QA76
.
9
.
A25
P437
2009


1058. Understanding Cryptography
Author: Christof Paar. Jan Pelzl
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA
,
76
.
9
,
U8P2
,
2010


1059. Understanding public-key infrastructure: concepts, standards, and deployment considerations
Author: Adams, Carlisle
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,Standards ، Computers-- Access control,، Cryptography
Classification :
QA
76
.
9
.
A25
.
A347
1999


1060. User's guide to cryptography and standards /
Author: Alexander W. Dent, Chris J. Mitchell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control-- Standards,Cryptography-- Standards
Classification :
QA76
.
9
.
A25
D465
2005

