• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۳ پاسخ غیر تکراری از ۳۳ پاسخ تکراری در مدت زمان ۱,۰۹ ثانیه یافت شد.

21. Lightweight Cryptography for Security and Privacy

Author: \ Thomas Eisenbarth, Erdinç Öztürk (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encyrption (Computer science) -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگره‌ها ,حفاظت اطلاعات -- کنگره‌ها

Classification :
QA
76
.
9
.
L5
2015
E-Book
,
RIS Bibtex

22. Mobile, Secure, and Programmable Networking :

Author: Éric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Congresses.,Mobile computing, Congresses.,Computer networks.,Mobile computing.

Classification :
TK5105
.
5
.
M76
2019
RIS Bibtex

23. Network and system security :

Author: Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Computer security.

Classification :
QA76
.
9
.
A25
RIS Bibtex

24. Proceedings of International Ethical Hacking Conference 2018 :

Author: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
RIS Bibtex

25. Progress in cryptology

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;

Classification :
RIS Bibtex

26. Progress in cryptology

Author: / Ed Dawson, Serge Vaudenay (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005
RIS Bibtex

27. Progress in cryptology - INDOCRYPT 2011 :

Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I58
2011
RIS Bibtex

28. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings

Author: Ed Dawson, Serge Vaudenay )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia

Classification :
QA
76
.
L28
Vol
.
3715
RIS Bibtex

29. Provable security :

Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.

Classification :
QA76
.
9
.
A25
RIS Bibtex

30. Public-Key Cryptography - PKC 2013 :

Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.

Classification :
QA76
.
9
.
A25
E358
2013
RIS Bibtex

31. Security aspects in information technology :

Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses

Classification :
QA76
.
9
.
A25
I58
2011
RIS Bibtex

32. Security in computing and communications :

Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.

Classification :
QA76
.
9
.
A25
RIS Bibtex

33. Trusted computing and information security :

Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.

Classification :
QA76
.
9
.
A25
RIS Bibtex
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival