1. A practical guide to TPM 2.0 :
Author: Will Arthur, David Challener, Kenneth Goldman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer Science.,Data Encryption.,Software Engineering/Programming and Operating Systems.
Classification :
QA76
.
9
.
A25


2. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Telecommunication,، Data encryption )Computer science(,، Electronic commerce
Classification :
TK
5105
.
59
.
A3


3. Advances in Cryptology -- ASIACRYPT'94 :
Author: edited by Josef Pieprzyk, Reihanah Safavi-Naini.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

4. Advances in Cryptology -- EUROCRYPT 2019 :
Author: Yuval Ishai, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


5. Advances in Cryptology – EUROCRYPT 2015
Author: \ edited by Elisabeth Oswald, Marc Fischlin.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA76
.
9
.
A38
2015
E-Book
,


6. Advances in Cryptology \U+2013\ EUROCRYPT 2011
Author: edited by Kenneth G. Paterson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity.,Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

7. Advances in Cryptology ђ́أ EUROCRYPT 2012
Author: edited by David Pointcheval, Thomas Johansson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

8. Advances in Digital Forensics VII
Author: edited by Gilbert Peterson, Sujeet Shenoi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Computers-- Law and legislation.,Data encryption (Computer science),Data mining.,Information storage and retrieval systems.

9. Advances in cryptology -- EUROCRYPT 2018 :
Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


10. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

11. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

12. Applied Cryptography and Network Security
Author: \ Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

13. Applied Cryptography and Network Security
Author: \ [Edited by] Michael Jacobson...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

14. Applied Cryptography and Network Security.
Author: \ [edited by] Tal Malkin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Cloud computing -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,محاسبات ابری -- کنگره ها
Classification :
QA
76
.
9
.
A66
2015
E-Book
,


15. Applied Cryptography and Network Security
Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها
Classification :
E-Book
,

16. Applied cryptography and network security :
Author: Javier Lopez, Gene Tsudik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Réseaux d'ordinateurs -- Sécurité -- Mesures.

17. Applied cryptography and network security
Author: Michael Jacobson ... [et al.]. (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing, Congresses,Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2013


18. Applied cryptography and network security :
Author: Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung, (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5102
.
94
.
A28
2019


19. Applied cryptography and network security
Author: Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2012eb


20. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010

