1. AES--Advanced encryption standard
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computers ; Access control ; Standards ; Congresses. ; Data encryption (Computer science) ; Standards ; Congresses. ; Computer security ; Standards ; Congresses. ;

2. Advanced encryption standard -- AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computers, Access control, Standards, Congresses,Data encryption (Computer science), Standards, Congresses,Computer security, Standards, Congresses

3. Advanced encryption standard--AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computers--Access control--Standards--Congresses., Data encryption (Computer science)--Standards--Congresses., Computer security--Standards--Congresses.
Classification :
QA
76
.
9
.
A25
A4
2005


4. Advanced encryption standard--AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control- Standards Congresses,Data encryption (Computer science)- Standards Congresses,Computer security- Standards Congresses
Classification :
QA76
.
9
.
A25
,
A4
2004


5. Advanced encryption standard -- AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Standards--Congresses,Data encryption (Computer science)--Standards--Congresses,Computer security--Standards--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
A4
,
2004


6. Advances in Cryptology - CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2004 : Proceedings
Author: Matt Franklin
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3152


7. Advances in cryptology--CRYPTO 2004
Author: / Matt Franklin (ed.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computers, Access control, Congresses,Cryptography, Congresses
Classification :
QA76
.
9
.
A25
,
C79
2004


8. Computer Securit
Author: / Sushil Jajodia, Javier Lopez (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses

9. Computer security--ESORICS 2010
Author: / Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computers, Access control, Congresses
Classification :
QA76
.
9
.
A25
2010


10. Computer security--ESORICS 2007
Author: / Joachim Biskup, Javier Lopez (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
E98
,
2007


11. Computer security -- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
Author: Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control
Classification :
QA
76
.
L28
Vol
.
3679


12. Critical information infrastructures security: third international workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 : revised papers
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control
Classification :
QA
76
.
9
.
A25
.
C75
2008


13. Data privacy management and autonomous spontaneous securit
Author: / Joaquin Garcia-Alfaro ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computers, Access control, Congresses,Internet, Security measures, Congresses,Electronic books
Classification :
QA76
.
9
.
A25
,
D66
2011


14. Data privacy management and autonomous spontaneous security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Computers-- Access control, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
D66
2011


15. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


16. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


17. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


18. ESORICS 2007--Computer security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computers ; Access control ; Congresses. ;

19. Emerging technologies for authorization and authentication :
Author: Andrea Saracino, Paolo Mori (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses.,Computer security, Congresses.,Computer science.,Computer security.,Computers-- Computer Vision & Pattern Recognition.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data protection.,Information retrieval.,Information technology: general issues.,Network hardware.,Pattern recognition.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


20. Formal to practical security :
Author: Véronique Cortier ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Data protection, Congresses.
Classification :
QA76
.
9
.
A25
F67
2009

