1. A cryptography primer :
Author: Philip N. Klein, Brown University, Providence, Rhode Island
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Digital signatures,Telecommunication-- Safety measures
Classification :
QA76
.
9
.
A25
K557
2014


2. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb


3. Advanced DPA theory and practice
Author: Eric Peeters
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Embedded computer systems-- Security measures
Classification :
TK7895
.
E42
P44
2013


4. Advanced statistical steganalysis
Author: / Rainer Bèohme
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Cryptography -- Statistical methods,Digital watermarking,Data encryption (Computer science)
Classification :
Z
104
.
B68
2010


5. Advanced statistical steganalysis
Author: / Rainer Beohme
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science),Cryptography
Classification :
QA76
.
9
.
A25B64
2010


6. Advanced statistical steganalysis /
Author: Rainer Böhme.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B64
2010


7. Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference Santa Barbara, CA, USA, August 19–23, 2018 Proceedings, Part II
Author: / Edited by Hovav Shacham, Alexandra Boldyreva.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: رمزگذاری دادهها,Data encryption (Computer science),کامپیوترها,Computer security,Computers -- Software Development & Engineering -- General., -- کنگرهها, -- Congresses, -- کنگرهها, -- Congresses, -- ایمنی اطلاعات,a03,a03,a05,a05,Data encryption.,Computer science.,Computer security.,Software Development & Engineering.

8. Advances in Cryptology -- EUROCRYPT 2019 :
Author: Yuval Ishai, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


9. Advances in Cryptology -- EUROCRYPT' 92 :
Author: edited by Rainer A. Rueppel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Operating systems (Computers)
Classification :
QA76
.
9
.
A25
E358
1993


10. Advances in Cryptology -- EUROCRYPT '88 :
Author: edited by D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli, G. Seegmüller, J. Stoer, N. Wirth, Christoph G. Günther.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science)

11. Advances in Cryptology -- EUROCRYPT '91 :
Author: edited by Donald W. Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Operating systems (Computers)

12. Advances in cryptology -- ASIACRYPT 2018 :
Author: Thomas Peyrin, Steven Galbraith (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


13. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


14. Advances in cryptology - ASIACRYPT 2018: 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2-6, 2018 : proceedings
Author: / Edited by Thomas Peyrin, Steven Galbraith.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Cryptography -- Congresses.,Data encryption (Computer science) -- Congresses.,Cryptography -- Congresses.,Computers -- Access control -- Congresses.,Cryptography.,Data encryption.,Post-Quantum Cryptanalysis.,Encrypted Storage.,Symmetric-Key Constructions.,Lattice Cryptography.,Quantum Symmetric Cryptanalysis.,Zero-Knowledge.,Public Key and Identity-Based Encryption.,Side-Channels. Signatures.,Leakage-Resilient Cryptography.,Multi-party Computation.,ORQM.,Real World Protocols.,Secret Sharing.,Isogeny Cryptography.

15. Advances in cryptology - EUROCRYPT 2010
Author: / Henri Gilbert, (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science)--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
E965
,
2010


16. Advances in cryptology -- EUROCRYPT 2013 :
Author: Thomas Johansson, Phong Q. Nguyen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial Intelligence.,Computer Security.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
T466
2013


17. Advances in cryptology - EUROCRYPT '94 :
Author: Alfredo De Santis, ed.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science)

18. Advances in cyber security: principle, techniques, and applications.
Author: / Edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: کامپیوترها,Computer security,رمزگذاری دادهها,Data encryption (Computer science),نظریه رمزگذاری,Coding theory, -- ایمنی اطلاعات,a03,a03,a05,a05,a07,a07,Computer security.,Data encryption.,Cryptographic approaches.,Cyber security.,Threat attacks.,Encryption schemes.

19. Advances in data and information sciences :
Author: Mohan L. Kolhe, Munesh C. Trivedi, Shailesh Tiwari, Vikash Kumar Singh, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer engineering, Congresses.,Software architecture, Congresses.,Artificial intelligence.,Computer engineering.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Software architecture.
Classification :
QA76
.
751


20. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011

