• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۶۶ پاسخ غیر تکراری از ۳۶۷ پاسخ تکراری در مدت زمان ۱,۰۰ ثانیه یافت شد.

221. Internet security. cryptographic principles, algorithms, and protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Man Young Rhee

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography

Classification :
TK5105
.
875
.
I57
.
R447

222. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Man Young Rhee

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography

Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003

223. Introduction to Cryptography :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Hans Delfs, Helmut Knebl.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory.,Computer science.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
B943
2002

224. Introduction to Cryptography

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Johannes A. Buchmann.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data structures (Computer science).,Mathematics.,Number theory.

Classification :

225. Introduction to Identity-Based Encryption.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Luther Martin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
L884
2008

226. Introduction to certificateless cryptography /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
X75
2017

227. Introduction to computer and network security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Richard R. Brooks, Clemson University, South Carolina, USA

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection

Classification :
QA76
.
9
.
A25
B7745
2014

228. Introduction to Cryptography

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Hans Delfs and Helmut Knebl

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures

Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007

229. Introduction to cryptography with open-source software /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Alasdair McAndrew.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography-- Mathematics.,Data encryption (Computer science),Open source software.

Classification :

230. Introduction to identity-based encryption

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Luther Martin

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)

Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008

231. Introduction to identity-based encryption

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Luther Martin

Library: Library of College of Science University of Tehran (Tehran)

Subject: Data encryption (Computer science),Public key cryptography,Public key infrastructure (Computer security)

Classification :
QA
76
.
9
.
A25
M374
2008

232. Java cryptography /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jonathan Knudsen

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography,Data encryption (Computer science),Java (Computer program language),Computer programming-- Management,Computer security

Classification :
QA76
.
73
.
J38
K683
1998

233. Locally decodable codes and private information retrieval schemes /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sergey Yekhanin.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll

Classification :
QA76
.
9
.
A25
Y45
2010eb

234. Modelling cyber security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Umberto Gori.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)

Classification :
QA76
.
9
.
D314
M64
2009

235. Modern Cryptography

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Chuck Easttom

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری داده‌ها,شبکه‌های اطلاع‌رسانی -- تدابیر ایمنی -- ریاضیات

Classification :
E-Book
,

236. Modern cryptanalysis : techniques for advanced code breaking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Christopher Swenson

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography

Classification :
QA
76
.
9
.
A25S93

237. Modern cryptography :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chuck Easttom

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics

Classification :
TK5102
.
94

238. Network and system security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Computer security.

Classification :
QA76
.
9
.
A25

239. Next generation SSH2 implementation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
L585
2009eb

240. Number-theoretic methods in cryptology :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.

Classification :
QA76
.
9
.
A25
N88
2017
  • »
  • 19
  • 18
  • 17
  • 16
  • 15
  • 14
  • 13
  • 12
  • 11
  • 10
  • 9
  • 8
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival