461. Topics in cryptology, CT-RSA 2003 : the Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 2003 : proceedings
Author: Marc Joye )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2612


462. Topics in cryptology, CT-RSA 2001: the Cryptographers' Track at RSA Conference 2001, San Francisco, CA, USA, April 2001: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
.
R753
2001


463. Topics in cryptology--CT-RSA 2004 : the Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004 : proceedings
Author: Tatsuaki Okamoto )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2964


464. Topics in cryptology--CT-RSA 2006 : the Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006 : proceedings
Author: David Pointcheval )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3860


465. Topics in cryptology, CT-RSA 2002 : the cryptographers' Track at RSA conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
Author: Bart Preneel )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2271


466. Topics in cryptology -- CT-RSA 2005 : the cryptographers' track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005 : proceedings
Author: Alfred Menezes )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3376


467. Towards hardware-intrinsic security
Author: / Ahmad-Reza Sadeghi, David Naccache
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer input-output equipment,Computer security,Cryptography
Classification :
TK
7887
.
5
.
T69
2010


468. Towards hardware-intrinsic security foundations and practice
Author: / Ahmad-Reza Sadeghi, David Naccache
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Cryptography,Computer input-output equipment
Classification :
QA76
.
T6S2
2010


469. Tribe of hackers red team :
Author: Marcus J Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.
Classification :
QA76
.
9
.
A25


470. Understanding and applying cryptography and data security
Author: Elbirt, Adam J.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security. ► Cryptography.
Classification :
005
.
E37u


471. Understanding and applying cryptography and data security
Author: Adam J. Elbirt
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25E38


472. Understanding Cryptography
Author: Christof Paar. Jan Pelzl
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA
,
76
.
9
,
U8P2
,
2010


473. Understanding public-key infrastructure: concepts, standards, and deployment considerations
Author: Adams, Carlisle
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,Standards ، Computers-- Access control,، Cryptography
Classification :
QA
76
.
9
.
A25
.
A347
1999


474. User's guide to cryptography and standards /
Author: Alexander W. Dent, Chris J. Mitchell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control-- Standards,Cryptography-- Standards
Classification :
QA76
.
9
.
A25
D465
2005


475. User's guide to cryptography and standards
Author: Dent, Alexander W
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Cryptography ► Computers
Classification :
76
.
9
.
A25D465

476. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography- Standards,Computers- Access control- Standards
Classification :
QA76
.
9
.
A25
,
D465
2005


477. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography, Standards,Computers, Access control, Standards
Classification :
QA76
.
9
.
A25D465
2005


478. based encryption-Introduction to identity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Public key cryptography. ; Public key infrastructure (Computer security) ;

479. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
,.
59
.
F672
2008


480. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
.
59
.
F672
2008

