• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۳۵ پاسخ غیر تکراری از ۱۳۸ پاسخ تکراری در مدت زمان ۰,۶۴ ثانیه یافت شد.

101. Progress in cryptology

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;

Classification :

102. Progress in cryptology

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Ed Dawson, Serge Vaudenay (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005

103. Progress in cryptology - INDOCRYPT 2011 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I58
2011

104. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ed Dawson, Serge Vaudenay )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia

Classification :
QA
76
.
L28
Vol
.
3715

105. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses

Classification :
QA
76
.
9
.
A25P787
2017

106. Provable security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Man-Ho Au, Atsuko Miyaji (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری داده‌ها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگره‌ها, -- کنگره‌ها, -- کنگره‌ها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07

Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,

107. Provable security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.

Classification :
QA76
.
9
.
A25

108. Provable security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tsuyoshi Takagi ... [et al.] (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
P76
2012eb

109. Public-Key Cryptography - PKC 2013 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.

Classification :
QA76
.
9
.
A25
E358
2013

110. Public Key Cryptography ђ́أ PKC 2012

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

Classification :

111. Recent trends in network security and applications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Natarajan Meghanathan ... [et al.] (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.

Classification :

112. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Willem Jonker, Milan Petkovic )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management

Classification :
QA
76
.
L28
Vol
.
3178

113. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Willem Jonker, Milan Petkovic )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management

Classification :
QA
76
.
L28
Vol
.
3674

114. Securing SQL Server :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter A. Carter

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SQL server,Database security,Computer Science,Database Management,Systems and Data Security

Classification :
QA76
.
9
.
D314

115. Securing digital video

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Eric Diehl

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)

Classification :
TK6680
.
5
.
D54
2012

116. Securing digital video

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eric Diehl

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures

Classification :
TK6680
.
5
.
D54
2012eb

117. Security, Privacy, and Anonymity in Computation, Communication, and Storage :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.

Classification :
QA76
.
9
.
A25

118. Security Protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

Classification :

119. Security and Persistence :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by John Rosenberg, J. Leslie Keedy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science.,Software engineering.

Classification :

120. Security and Trust Management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Catherine Meadows, Carmen Fernandez-Gago

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

Classification :
  • »
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival