141. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28


142. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings
Author: John Ioannidis, angelos keromytis, moti Yung (eds)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses
Classification :
TK
،
5102
.
85
،.
A26
،
2005


143. Applied public key infrastructur
Author: / edited by Jianying Zhou ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I558
,
2005eb


144. Applied public key infrastructure :
Author: edited by Jianying Zhou ... [et al.].
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Public key infrastructure (Computer security),Public-key cryptography,Congresses.,Congresses.
Classification :
QA76
.
9
.
A25
I558
2005


145. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


146. Applied public key infrastructure
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Public key infrastructure (Computer security) ; Congresses. ; Public

147. Asian 2006--Advances in computer science
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

148. Autonomic and trusted computin
Author: / Chunming Rong ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Autonomic computing--Congresses,Computer security--Congresses,Computer networks--Security measures--Congresses

149. Autonomic and trusted computing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Autonomic computing ; Congresses. ; Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

150. Autonomic and trusted computing: 5th international conference, ATC 2008, Oslo, Norway, June 23-25, 2008 ; proceedings
Author: Chunming Rong ... ]et al.[ )eds.(
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Autonomic conputing,Congresses ، Computer security,Security measures -- Congresses ، Computer networks
Classification :
QA
76
.
9
.
A97
A83
2008


151. Big data and security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

152. Big data and security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

153. Boolean functions in cryptology and information security
Author: / edited by Bart Preneel and Oleg A. Logachev
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses
Classification :
E-BOOK

154. Botnet detection
Author: edited by Wenke Lee, Cliff Wang and David Dagon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.

155. Business object design and implementation :
Author: J. Sutherland ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Congresses,Computer security-- Congresses,Object-oriented methods (Computer science)-- Congresses
Classification :
QA76
.
9
.
A25
W669
1995


156. CCS'05 : proceedings of the 12th ACM Conference on Computer and Communications Security, November 7-11, 2005, Alexandria, Virginia, USA
Author: Catherine Meadows & Paul Syverson, editors; sponsored by ACM Special Interest Group on Security, Audit and Control )SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Security measures -- Congresses ، Telecommunication systems
Classification :
QA
76
.
9
.
A25A26
2005


157. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
Author: ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25A26
2010


158. CCS 2004 : proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 25-29, 2004
Author: edited by: Birgit Pfitzmann & Peng Liu; sponsored by ACM SIGSAC, with contributions from Defense Advanced Research Project Agency... ]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Security measures -- Congresses ، Telecommunication systems
Classification :
QA
76
.
9
.
A25A26
2004


159. CCSʹ08 : proceedings of the ...
Author: ACM Conference on Computer and Communications Security (15th : Alexandria, Virginia, USA : 2008)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security- Congresses ► Telecommunication systems- Security measures - Congresses
Classification :
005
.
A184c


160. CHES 2010--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ; Cryptographie ; Congr?s. ; ram. ; Syst?mes enfouis (informatique) ; Congr?s. ; ram. ; Chiffrement (informatique) ; Congr?s. ; ram. ; Eingebettetes Sys
