81. Applied public key infrastructure :
Author: edited by Jianying Zhou ... [et al.].
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Public key infrastructure (Computer security),Public-key cryptography,Congresses.,Congresses.
Classification :
QA76
.
9
.
A25
I558
2005


82. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


83. Applied public key infrastructure
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Public key infrastructure (Computer security) ; Congresses. ; Public

84. Applied quantum cryptography
Author:
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Photon detectors,Quantum cryptography,Computer security,Quantum theory
Classification :
005
.
82
A652


85. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


86. Authentication systems for secure networks
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


87. #Beginning cryptography with Java
Author: #David Hook
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography ،Public key infrastructure )Computer security( ،Java )Computer program language(
Classification :
#
QA
،#.
A25
H645


88. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
005
.
8
H781B
2005


89. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
QA76
.
9
.
A25
,
H645
2005


90. Boolean functions in cryptology and information security
Author: / edited by Bart Preneel and Oleg A. Logachev
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses
Classification :
E-BOOK

91. Broadband quantum cryptography
Author: / Daniel J. Rogers
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Cryptography,Broadband communication systems -- Security measures,Quantum communication
Classification :
QA
76
.
9
.
A25
R64
2010


92. Broadband quantum cryptography /
Author: Daniel J. Rogers
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Broadband communication systems-- Security measures,Cryptography,Data encryption (Computer science),Quantum communication
Classification :
QA76
.
9
.
A25
R64
2010


93. Building in big brother :
Author: edited by Lance J. Hoffman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25
B85
1995


94. CHES 2010--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ; Cryptographie ; Congr?s. ; ram. ; Syst?mes enfouis (informatique) ; Congr?s. ; ram. ; Chiffrement (informatique) ; Congr?s. ; ram. ; Eingebettetes Sys

95. CHES 2002 :--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses ; Cryptography ; Congresses ; Computer security ; Congresses ;

96. CHES 2005--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ;

97. CRYPTO 2006-Advances in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ;

98. Chaos-based cryptography :
Author: Ljupco Kocarev and Shiguo Lian (Eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Artificial Intelligence (incl. Robotics),Computational Intelligence,Data Encryption,Data Structures, Cryptology and Information Theory
Classification :
QA76
.
9
.
A25
C427
2011eb


99. Chaos-based cryptography :theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev, Shiguo Lian
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C427


100. Chaos-based cryptography : theory, algorithms and applications
Author: Ljupco Kocarev, Shiguo Lian )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography,، Chaotic behavior in systems,، Computer security
Classification :
Z
103
.
C42

