61. Information hiding :5th international workshop, IH 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002 : revised papers
Author: Fabien A.P. Petitcolas )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
2578


62. Information hiding : 4th international workshop, IH 2001 Pittsburgh, PA, USA, April 2001 : proceedings
Author: Ira S. Moskowitz )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
2137


63. Information hiding : third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings
Author: Andreas Pfitzmann )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
1768


64. Information security
Author: / edited by David T. Lindsay, Wyn L. Price
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25
I46
1991


65. Information security and privacy
Author: Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
A279
2012eb


66. Information security and privacy
Author: / Josef Pieprzyk, Hossein Ghodosi, Ed. Dawson (Eds.)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers -- Access control -- Congresses,Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A251


67. Information security and privacy : First Australasian Conference, ACISP'96, wollongong, NSW, Australia, June 24-26, 1996 : proceedings
Author: Josef Pieprzyk, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1172


68. Information security and privacy : Second Australian Conference,ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings
Author: Vijay Varadharajan, Josef Pieprzyk, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1270


69. Information security and privacy : Third Australasian Conference, ACISP'98, Brisbane, Australia, July 13-15, 1998 : proceedings
Author: Colin Boyd, Ed Dawson, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1438


70. Information security and privacy : 5th Australasian Conference, ACISP'2000, Brisbane, Australia, July 10-12, 2000 : proceedings
Author: Ed Dawson, Andrew Clark, Colin Boyd )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1841


71. Information security and privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
Author: Colin Boyd, Juan M. Gonzalez Nieto )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
3574


72. Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
Author: Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
3108


73. Information security and privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
Author: Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1587


74. Information security and privacy; 13th Australasian conference, ACISP 2008, Wollongong Australia, July 7-9, 2008 proceedings
Author: / [edited by] Yi Mu, Willy Susilo, Jennifer Seberry,ACISP (2008:13th: Wollongong)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A25A279
2008


75. Information security and privacy : 6th Australian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings
Author: Vijay Varadharajan, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
2119


76. Information security applications
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Data protection ; Congresses. ;

77. Information security applications :
Author: Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.).
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security,Data protection,Congresses.,Congresses.
Classification :
QA76
.
9
.
A25
W577
2007


78. Information security applications
Author: / Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
W577
,
2007


79. Information security applications :
Author: Brent ByungHoon Kang, JinSoo Jang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data protection, Congresses.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


80. Information security applications
Author: Heung Youl Youm, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2009eb

