81. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010


82. Applied cryptography and network security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

83. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089


84. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3531


85. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846


86. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28


87. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings
Author: John Ioannidis, angelos keromytis, moti Yung (eds)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses
Classification :
TK
،
5102
.
85
،.
A26
،
2005


88. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

89. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

90. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

91. Applied information security :
Author: David Basin, Patrick Schaller, Michael Schläpfer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B37
2011


92. Applied information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Computer networks ; Security measures. ; Data protection. ;

93. Applied information security
Author: / David Basin, Patrick Schaller, Michael Schleapfer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Data encryption (Computer science),Computer networks--Security measures,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
B3798
,
2011


94. Artificial Intelligence and Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science). ; Computer Communication Networks. ; Artificial intelligence. ; Computer vision. ; Systems and Data Security. ;

95. Artificial Intelligence and Security :
Author: edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Cloud computing-- Security measures, Congresses.,Artificial intelligence.
Classification :
QA76
.
9
.
A25
I23
2019


96. Availability, Reliability, and Security in Information Systems and HCI :
Author: edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
E358
2013


98. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

99. Bitcoin, Blockchain Technology, and Secure Hash Algorithms
Author: Plummer, Daniel Eugene
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Electrical engineering,Mathematics

100. Blockchain :
Author: Melanie Swan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Electronic commerce,Electronic funds transfers-- Security measures
Classification :
HG221
.
S963
2015

