81. Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers
Author: Kijoon Chae, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: International cooperation -- Congresses ، Computer security,International cooperation -- Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
2908


82. Information security applications : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers
Author: Chae Hoon Lim, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: International cooperation -- Congresses ، Computer security,International cooperation -- Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
3325


83. Information security, coding theory and related combinatorics: information coding and combinatorics
Author: / [edited by] Dean Crnkovic, Vladimir Tonchev; [proceedings of the Nato Advanced Study Institute on Information Security and Related Combinatorics, Opatija, Croatia, 31 May - 11 June 2010]
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer security,Coding theory,Combinatorial analysis,-- Congresses,-- Congresses,-- Congresses,-- Congresses
Classification :
005
.
8
N279I
2011


84. Information security practice and experience
Author: / Robert H. Deng ... [et al.] (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer networks,Data Protection, -- Congresses, -- Congresses, -- Congresses, -- Security measures,a04,a06,a08
Classification :
QA76
.
9
.
A25
I855
2005


85. Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Author: Robert H. Deng... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
3439


86. Information security technology for applications
Author: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
N67
2009eb


87. Information security theory and practice
Author: / dhiren R.patel
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security- Congresses,Computer networks- Security measures- Congresses,Data protection- Congresses
Classification :
QA76
.
9
.
D5
2008


88. Information security theory and practice
Author: Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W59
2012eb


89. Information systems security: Facing The information society of the 21st Centary
Author: edited by Sokratis K. Katsikas and Dimitris Gritzalis
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer Security - Congresses , Data protection - Congresses
Classification :
QA
76
.
9
.
A25
I343
1996


90. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


91. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.

92. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;

93. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb


94. Information theoretic security :
Author: Serge Fehr (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I323
2011


95. Lightweight Cryptography for Security and Privacy
Author: \ Thomas Eisenbarth, Erdinç Öztürk (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encyrption (Computer science) -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
L5
2015
E-Book
,


96. Privacy enhancing technologies
Author: Emiliano De Cristofaro, Matthew Wright (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
P48
2013


97. Privacy in statistical databases
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Databases ; Statistics ; Congresses. ; Data protection ; Congresses. ; Statistische Datenbank ; swd. ; Privatsph?re ; swd. ; Anonymisierung ; swd. ; Datensicherung ; swd. ; Personenbezogene Daten ; swd. ; Datenschutz ; sw

98. Privacy in statistical databases
Author: Josep Domingo-Ferrer, Emmanouil Magkos (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data protection, Congresses,Databases-- Statistics, Congresses
Classification :
QA76
.
9
.
A25
P73
2010eb


99. Privacy in statistical databases
Author: / Josep Domingo-Ferrer, Emmanouil Magkos (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Databases--Statistics--Congresses,Data protection--Congresses,Statistische Datenbank--swd,Privatspheare--swd,Anonymisierung--swd,Datensicherung--swd,Personenbezogene Daten--swd,Datenschutz--swd,Tabelle--swd,Kerkira <2010>--swd,Kongress--swd
Classification :
QA
,
76
.
9
,.
A25
,
P79
,
2010


100. Privacy in statistical databases : CASC Project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings
Author: Josep Domingo-Ferrer, Vicenc Torra )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Statistics -- Congresses ، Databases,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
3050

