661. Theory of cryptography
Author: Amit Sahai (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T44
2013


662. Theory of quantum computation, communication and cryptography
Author: Andrew Childs, Michele Mosca (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses,Quantum communication-- Security measures, Congresses,Quantum computers, Congresses
Classification :
QA76
.
889
.
T63
2009


663. Theory of security and applications
Author: Sebastian Mödersheim, Catuscia Palamidessi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
J65
2012eb


664. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


665. Topics in cryptology -- CT-RSA 2019 :
Author: Mitsuru Matsui (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


666. Topics in cryptology -- CT-RSA 2018 :
Author: Nigel P. Smart (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Hardware-- Network Hardware.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information architecture.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


667. Topics in cryptology-- CT-RSA 201
Author: / Aggelos Kiayias (ed.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Cryptography, Congresses,Electronic books
Classification :
QA76
.
9
.
A25
,
C79
2011


668. Transactions on Computational Science X
Author: edited by Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.,Software engineering.

669. Transactions on Computational Science XI
Author: edited by Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computational complexity.,Computer networks.,Computer science.,Computer software.,Data encryption (Computer science)

670. Transactions on Data Hiding and Multimedia Security X
Author: \ Yun Q. Shi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),رمزگذاری دادهها,a03,a03,Multimedia systems -- Security measures.,سامانههای چندرسانهای -- تدابیر ایمنی
Classification :
QA
76
.
9
.
T7
2015
E-Book
,


671. Transactions on Large-Scale Data- and Knowledge- Centered Systems XXIII
Author: \ Abdelkader Hameurlain, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Computer networks,کامپیوترها,رمزگذاری دادهها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
D3T7
2016
E-Book
,


672. Transactions on data hiding and multimedia security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Multimedia systems. ; Data encryption (Computer science) ;

673. Transactions on data hiding and multimedia security I
Author: / Yun Q. Shi (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Multimedia systems.,Data encryption (Computer science)

674. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


675. Trust and Trustworthy Computing
Author: \ Mauro Conti, Matthias Schunter, Ioannis Askoxylakis (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Computer security,رمزگذاری دادهها,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05,Computers and Society,کامپیوترها و جامعه
Classification :
QA
76
.
9
.
A25
T79
2015
E-Book
,


676. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


677. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


678. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,


679. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


680. Trusted computing--challenges and application
Author: / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses,Public key infrastructure (Computer security)--Congresses
