21. Data hiding fundamentals and applications :
Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.
Classification :
QA76
.
H877
2004


22. Dynamic secrets in communication security
Author: / Sheng Xiao, Weibo Gong, Don Towsley
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Data encryption (Computer science),Cryptography
Classification :
QA76
.
9
.
A25


23. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


24. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010


25. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010


26. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

27. Information security and cryptology :
Author: Xuejia Lai, Moti Yung, Dongdai Lin (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5525
2010eb


28. Information security and cryptology
Author: Feng Bao ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
76
.
O63


29. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.

30. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;

31. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb


32. Innovative cryptography
Author: / Nick Moldovyan, Alex Moldovyan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Telecommunication--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
M665
,
2007


33. Innovative cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Telecommunication ; Security measures. ; Cryptography. ;

34. Innovative cryptography /
Author: Nick Moldovyan, Alex Moldovyan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Telecommunication-- Security measures
Classification :
QA76
.
9
.
A25
M665
2007


35. Internet security
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57R447
2003

36. Internet security
Author: / Man Young Rhee
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Internet --Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R4
2003


37. Internet security
Author: / Man Young Rhee
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
E-BOOK

38. Internet security
Author: / Man Young Rhee
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
,.
R447
2003


39. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003


40. Internet security :cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Internet,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447

