101. Progress in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;

102. Progress in cryptology
Author: / Ed Dawson, Serge Vaudenay (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005


103. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


104. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Author: Ed Dawson, Serge Vaudenay )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia
Classification :
QA
76
.
L28
Vol
.
3715


105. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings
Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses
Classification :
QA
76
.
9
.
A25P787
2017


106. Provable security.
Author: \ Man-Ho Au, Atsuko Miyaji (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری دادهها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,


107. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


108. Provable security
Author: Tsuyoshi Takagi ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
P76
2012eb


109. Public-Key Cryptography - PKC 2013 :
Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.
Classification :
QA76
.
9
.
A25
E358
2013


110. Public Key Cryptography ђ́أ PKC 2012
Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

111. Recent trends in network security and applications :
Author: Natarajan Meghanathan ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.

112. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178


113. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674


114. Securing SQL Server :
Author: Peter A. Carter
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SQL server,Database security,Computer Science,Database Management,Systems and Data Security
Classification :
QA76
.
9
.
D314


115. Securing digital video
Author: / Eric Diehl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
Classification :
TK6680
.
5
.
D54
2012


116. Securing digital video
Author: Eric Diehl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
Classification :
TK6680
.
5
.
D54
2012eb


117. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


118. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

119. Security and Persistence :
Author: edited by John Rosenberg, J. Leslie Keedy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Software engineering.

120. Security and Trust Management
Author: edited by Catherine Meadows, Carmen Fernandez-Gago
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security
