41. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003

42. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008


43. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


44. Introduction to cryptography with open-source software /
Author: Alasdair McAndrew.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography-- Mathematics.,Data encryption (Computer science),Open source software.

45. Introduction to identity-based encryption
Author: / Luther Martin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008


46. Introduction to identity-based encryption
Author: / Luther Martin
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA
76
.
9
.
A25
M374
2008


47. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb


48. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


49. Modern cryptanalysis : techniques for advanced code breaking
Author: Christopher Swenson
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93


50. Progress in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;

51. Progress in cryptology
Author: / Ed Dawson, Serge Vaudenay (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005


52. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


53. Progress in cryptology - INDOCRYPT 2018 :
Author: Debrup Chakraborty, Tetsu Iwata (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science),Data mining.,Data structures (Computer science),Software engineering.
Classification :
QA76
.
9
.
D335
P76
2018


54. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Author: Ed Dawson, Serge Vaudenay )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia
Classification :
QA
76
.
L28
Vol
.
3715


55. Public-Key Cryptography – PKC 2015
Author: \ Jonathan Katz (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Public key cryptography -- Congresses.,Data encryption (Computer science),Systems and Data Security.,رمزنگاری کلید عمومی -- کنگره ها,رمزگذاری دادهها
Classification :
QA76
.
9
.
P81
2015
E-Book
,


56. #Public key cryptography
Author: #David Naccache, Pascal Paillier )eds.(
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security- Congresses ،Computers- Access control- Congresses ،Data encryption )Computer science(- Congresses ،Public key cryptography- Congresses
Classification :
#
QA
،#.
A25
,
I567
،#
2002


57. Public key cryptography
Author: / David Naccache, Pascal Paillier (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computers -- Access control,Data encryption (Computer science),Public key cryptography
Classification :
QA
76
.
9
.
A25
I567
2002


58. Public key cryptography, PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I5555
2006


59. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002; proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I567
2002


60. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses
