501. Progress in cryptology -- AFRICACRYPT 2018 :
Author: Antoine Joux, Abderrahmane Nitaj, Tajjeeddine Rachidi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer hardware.,Computer security.,Computer security.,Computers-- Hardware-- General.,Computers-- Hardware-- Network Hardware.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Network hardware.
Classification :
QA76
.
9
.
A25


502. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009


503. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


504. Progress in cryptology - INDOCRYPT 2018 :
Author: Debrup Chakraborty, Tetsu Iwata (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science),Data mining.,Data structures (Computer science),Software engineering.
Classification :
QA76
.
9
.
D335
P76
2018


505. Progress in cryptology - LATINCRYPT 2012
Author: Alejandro Hevia, Gregory Neven (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


506. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Author: Ed Dawson, Serge Vaudenay )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia
Classification :
QA
76
.
L28
Vol
.
3715


507. Protecting Oracle Database 12c /
Author: Paul Wright
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Database management.,Database security.,Computer Science.,Data Encryption.,Database Management.
Classification :
QA76
.
9
.
D314


508. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


509. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings
Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses
Classification :
QA
76
.
9
.
A25P787
2017


510. Provable security.
Author: \ Man-Ho Au, Atsuko Miyaji (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری دادهها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,


511. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


512. Provable security
Author: Tsuyoshi Takagi ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
P76
2012eb


513. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

514. Public-Key Cryptography – PKC 2015
Author: \ Jonathan Katz (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Public key cryptography -- Congresses.,Data encryption (Computer science),Systems and Data Security.,رمزنگاری کلید عمومی -- کنگره ها,رمزگذاری دادهها
Classification :
QA76
.
9
.
P81
2015
E-Book
,


515. Public-Key Cryptography - PKC 2013 :
Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.
Classification :
QA76
.
9
.
A25
E358
2013


516. Public Key Cryptography ђ́أ PKC 2012
Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

517. Public key cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ;

518. Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Computer security ; Congresses. ; Computers ; Access control ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Public

519. Public key cryptography
Author: / Hideki Imai, Yuliang Zheng (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I567
,
2000


520. Public key cryptography
Author: / David Naccache, Pascal Paillier (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computers -- Access control,Data encryption (Computer science),Public key cryptography
Classification :
QA
76
.
9
.
A25
I567
2002

