221. Internet security. cryptographic principles, algorithms, and protocols
Author: / Man Young Rhee
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
.
R447


222. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003

223. Introduction to Cryptography :
Author: by Hans Delfs, Helmut Knebl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B943
2002


224. Introduction to Cryptography
Author: by Johannes A. Buchmann.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data structures (Computer science).,Mathematics.,Number theory.

225. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008


226. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


227. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


228. Introduction to Cryptography
Author: Hans Delfs and Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007


229. Introduction to cryptography with open-source software /
Author: Alasdair McAndrew.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography-- Mathematics.,Data encryption (Computer science),Open source software.

230. Introduction to identity-based encryption
Author: / Luther Martin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008


231. Introduction to identity-based encryption
Author: / Luther Martin
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA
76
.
9
.
A25
M374
2008


232. Java cryptography /
Author: Jonathan Knudsen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Java (Computer program language),Computer programming-- Management,Computer security
Classification :
QA76
.
73
.
J38
K683
1998


233. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb


234. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


235. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

236. Modern cryptanalysis : techniques for advanced code breaking
Author: Christopher Swenson
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93


237. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


238. Network and system security :
Author: Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer security.
Classification :
QA76
.
9
.
A25


239. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


240. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017

