221. Decrypted secrets : methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
B38
2002


222. Decrypted secrets: methods and maxims of cryptology
Author: / Friedrich L. Bauer
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25B38513
2000


223. Decrypted secrets : methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig, 1924-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Cryptography
Classification :
005
B344d


224. Decrypted secrets: methods and maxims of cryptology
Author: / Friedrich L. Bauer.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Cryptography
Classification :
652
.
8
B344D
1997
21


225. Decrypted secrets : methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Cryptography
Classification :
76
.
9
.
A25
B38
2007

226. Decrypted secrets : methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security - Congresses , Cryptography - Congresses
Classification :
QA
76
.
9
.
A25
B38513
1997


227. Decrypted secrets: methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig, 1924-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Cryptography
Classification :
652
B344d


228. Decrypted secrets: methods and maxims of cryptology,Entzifferte Geheimnisse. English
Author: Bauer, Friedrich Ludwig
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
.
B38513
1997


229. Digital signature: networ security practices
Author: Gupta, Kailash N.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Signatures )Writing(,، Cryptography
Classification :
QA
76
.
9
.
A25
G86


230. Digital signature schemes
Author: / Birgit Pfitzmann
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Signatures (Writing),Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
P444
,
1996


231. Digital signature schemes :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Signatures (Writing) ; Cryptography ;

232. Digital signature schemes : general framework and fail-stop signatures
Author: Birgit Pfitzmann
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Signatures )Writing(,، Cryptography
Classification :
QA
76
.
L28
Vol
.
1100


233. Disappearing cryptograph
Author: / Peter Wayner
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Cryptography.,Internet.
Classification :
TK
,
5105
.
59
,.
W39
,
2009


234. Disappearing cryptography
Author: Peter Wayner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cryptography,Internet
Classification :
TK5105
.
59
.
W39
2009


235. Disappearing cryptography : information hiding :steganography & watermarking
Author: Wayner, Peter, 1964-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks-Security measures ► Cryptography ► Internet ► Digital watermarking
Classification :
005
W985d


236. Disappearing cryptography: information hiding: steganography & watermarking
Author: Wayner, Peter
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography,، Internet
Classification :
TK
5105
.
59
.
W39
2002


237. Dynamic secrets in communication security
Author: / Sheng Xiao, Weibo Gong, Don Towsley
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Data encryption (Computer science),Cryptography
Classification :
QA76
.
9
.
A25


238. Electromagnetic information leakage and countermeasure technique /
Author: Taikang Liu and Yongmei Li ; translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.,COMPUTERS-- Security-- Cryptography.
Classification :
QA76
.
9
.
A25
L58
2019eb


239. Elliptic curves and their applications to cryptography :
Author: by Andreas Enge.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Curves, Elliptic.

240. Elliptic curves and their applications to cryptography : an introduction
Author: by Andreas Enge
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography,، Curves, Elliptic
Classification :
QA
76
.
9
.
A25E54

