341. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb


342. Malicious cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer viruses ; Prevention ; Data protection ;

343. Malicious cryptography
Author: / Adam Young, Moti Yung
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer viruses--Prevention,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
Y65
,
2004


344. Malicious cryptography :
Author: Adam Young, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer viruses-- Prevention,Cryptography,Data protection
Classification :
QA76
.
9
.
A25


345. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


346. Modern cryptanalysis : techniques for advanced code breaking
Author: Christopher Swenson
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93


347. #Modern cryptography
Author: #Wenbo Mao
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography
Classification :
#
QA
،#.
A25
,
M36


348. Modern cryptography, probabilistic proofs, and pseudorandomness
Author: Goldreich, Oded.
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
G64
1999


349. Modern cryptography, probabilistic proofs and pseudorandomness
Author: Oded Goldreich
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25G64


350. Modern cryptography, probabilistic proofs and pseudorandomness
Author: Oded Goldreich
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA
,
76
.
9
,.
A25G64
,
1999


351. .NET security and cryptography /
Author: Peter Thorsteinson and Arun Ganesh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.

352. #.NET security and cryptography
Author: #Peter Thorsteinson and Arun Ganesh
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography ،Microsoft .NET
Classification :
#
QA
،#.
A25
,
T48


353. .NET security and cryptography
Author: / Peter Thorsteinson and Arun Ganesh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Microsoft .NET
Classification :
QA76
.
9
.
A25
,
T48
2003


354. NET security and cryptography
Author: Thorsteinson, Peter.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Cryptography ► Microsoft .NET
Classification :
T515n

355. Novel Cryptographic Primitives and Protocols for Censorship Resistance
Author: Kevin Patrick Dyer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Applied sciences;Censorship circumvention;Computer security;Cryptography;Network security

356. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


357. Pairing 2009-based cryptography -Pairing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cryptography ; Congresses. ; Computer security ; Congresses. ; Sets of pairs of functions to be distinguished ; Congresses. ; Paarungsbasierte Kryptographie ; Kongress ; Palo Alto ; Paarungsbasierte Kryptographie. ; swd. ;

358. Pairing-based cryptography - Pairing 200
Author: / Hovav Shacham, Brent Waters (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography--Congresses,Computer security--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I55447
,
2009


359. Pairing-based cryptography - Pairing 2008: second international conference, Egham, UK, September 1-3, 2008 ; proceedings
Author: Steven D. Galbraith, Kenneth G. Paterson )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
I55447


360. Practical cryptography
Author: Ferguson, Niels.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Cryptography,، Computer security
Classification :
QA
76
.
9
.
A25
F466
2003

