1. Elliptic curves in cryptography
Author: I. F. Blake, G. Seroussi, N. P. Smart
Library: Central library and Documentation Center (Zanjan)
Subject: ، Computer security,، Cryptography,، Curve, Elliptic - Data processing
Classification :
QA
76
.
9
.
A25
B27
1999


2. Elliptic curves in cryptography /
Author: I.F. Blake, G. Seroussi, N.P. Smart
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Curves, Elliptic-- Data processing,clé publique,courbe elliptique,cryptographie
Classification :
QA76
.
9
.
A25
B57
1999


3. Mastering Ethereum :
Author: Andreas M. Antonopoulos and Dr. Gavin Wood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer software-- Development.,Distributed databases.,Electronic data processing-- Distributed processing.,Blockchains (Databases),Computer software-- Development.,COMPUTERS-- Databases-- General.,COMPUTERS-- Software Development & Engineering-- General.,Distributed databases.,Electronic data processing-- Distributed processing.
Classification :
QA76
.
9
.
D32


4. Security in the Information Society :
Author: edited by M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Information theory.
Classification :
QA76
.
9
.
A25
E358
2002

