• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۱۷ پاسخ غیر تکراری از ۱۱۷ پاسخ تکراری در مدت زمان ۰,۸۳ ثانیه یافت شد.

1. Accountability and Security in the Cloud

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Massimo Felici , Carmen Fernández-Gago (Eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Cloud computing -- Security measures -- Congresses.,Data protection -- Congresses,Data encryption (Computer science) -- Congresses.,محاسبات ابری -- تدابیر ایمنی -- کنگره ها ,حفاظت اطلاعات -- کنگره‌ها ,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
QA
76
.
585
.
A25
2015
E-Book
,

2. Advances in cryptology-- ASIACRYPT 2011 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Dong Hoon Lee, Xiaoyun Wang

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
.
I58
2011

3. Advances in cryptology-Asiacrypt'98 : International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, 1998 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kazuo Ohta, Dingyi Pei )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Cryptography

Classification :
QA
76
.
L28
Vol
.
1514

4. Advances in information security and its application :third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: Congresses. ، Information technology--securithy measures,Congresses. ، Computer security,Congresses. ، Data protection

Classification :
QA
76
.
9
.
A25
I51
2009

5. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(

Classification :
QA
76
.
9
.
A25A26
2010

6. Communications and multimedia security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bart de Decker, Ingrid Schaumüller-Bichl (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data protection, Congresses.,Internet-- Security measures, Congresses.,Multimedia systems-- Security measures, Congresses.

Classification :
QA76
.
9
.
A25
I35
2010

7. Computational intelligence for privacy and security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: World congress on computational intelligence (2010 July : Barcelona, Spain)

Library: Central Library and Document Center of Isfahan University (Esfahan)

Subject: Information technology -Security measures - Congresses ► Computer security - Congresses ► Data protection - Congresses ► Computational intelligence- Congresses

Classification :
005
.
W927c

8. Computational intelligence for privacy and security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computational intelligence,Congresses ، Computer security,Congresses ، Data protection,Security measures -- Congresses ، Information technology

Classification :
Q
342
.
C653

9. Computer security and information integrity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / IFIP Sec' 90, Espoo (Helsiniki), Finland, 23-25 May, 1990, edited by Klaus Dittrich, Seppo rautakivi, Juhani Saari

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer security -- Congresses,Data Protection -- Congresses

Classification :
QA
76
.
9
.
A25I45
1990

10. Critical information infrastructures security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Erich Rome, Robin Bloomfield (Eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security, Congresses,Information networks, Access control, Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25C75
2010

11. Cyberlaw, security and privacy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sylvia Mercado Kierkegaard (editor).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Law and legislation, Congresses.,Computers-- Law and legislation, Congresses.,Data protection, Congresses.,Computer security-- Law and legislation.,Computers-- Law and legislation.,Data protection.

Classification :
K564
.
C6
I58
2007

12. DIM '05 : proceedings of the 2005 ACM Workshop on Digital Identity Management, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Data protection

Classification :
TK
5105
.
59
.
A2282
2005

13. DRM '05 : proceedings of the Fifth ACM Workshop on Digital Rights Management, November 7, 2005, Alexandria, Virginia, USA )co-located with CCS 2005(

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rei Safavi-Naini & Moti Yung, editors; sponsored by ACM Special Interest Group on Security, Audit & Control )SIGSAC(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection

Classification :
QA
76
.
9
.
A25A323
2005

14. DRM 2003 : proceedings of the Third ACM Workshop on Digital Rights Management : Washington, DC, USA

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Moti Yung; sponsored by ACM SIGSAC

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection

Classification :
QA
76
.
9
.
A25A323
2003

15. Data and applications security and privacy XXIV

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Sara Foresti, Sushil Jajodia (eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security, Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25I35
2010

16. Data and applications security and privacy XXVI

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Data protection, Congresses,Database security, Congresses,Internet-- Security measures, Congresses

Classification :
QA76
.
9
.
D314
I34
2012eb

17. Data and applications security and privacy XXXIII :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Simon N. Foley (Ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Internet-- Security measures, Congresses.,Application software.,Computer security.,Data protection.,Internet-- Security measures.

Classification :
QA76
.
9
.
A25
I35
2019

18. Data privacy management and autonomous spontaneous security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joaquin Garcia-Alfaro ... [et al.] (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Autonomic computing, Congresses.,Computer security, Congresses.,Data protection, Congresses.

Classification :

19. Data privacy management and autonomous spontaneous security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joaquin Garcia-Alfaro ... [et al.] (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Autonomic computing, Congresses.,Computer security, Congresses.,Data protection, Congresses.

Classification :

20. Data privacy management, cryptocurrencies and blockchain technology :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computers and Society.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Systems and Data Security.,Computer networking & communications.,Computer security.,Computer security.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data protection.,Ethical & social aspects of IT.,Software Engineering.

Classification :
QA76
.
9
.
A25
  • »
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival