61. Quantum communications and cryptography
Author: edited by Alexander V. Sergienko
Library: (Semnan)
Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication
Classification :
TK
5102
.
94
.
Q83


62. Quantum communications and cryptography
Author: / edited by Alexander V. Sergienko
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Quantum communication--Security measures,Cryptography.,Coding theory.,Data encryption (Computer science),Quantum communication.
Classification :
TK
,
5102
.
94
,.
Q36
,
2005


63. Quantum communications and cryptography
Author: edited by Alexander V. Sergienko
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication
Classification :
TK
5102
.
94
.
Q36
2006


64. Quantum communications and cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Quantum communication ; Security measures ; Cryptography ; Coding theory ; Data encryption (Computer science) ; Quantum communication ;

65. Quantum private communication
Author: Guihua Zeng
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
TK
،
5102
.
94
،.
Z46
،
2010


66. Quantum private communication
Author: / Guihua Zeng
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
E-BOOK

67. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK

68. Secret history :
Author: Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography-- History,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B384
2013


69. Security for wireless sensor networks using identity-based cryptography /
Author: Harsh Kupwade Patil, Stephen A. Szygenda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers-- Access control.,Data encryption (Computer science),Public key cryptography.

70. Selected areas in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cryptography ; Congresses. ; Computer security ; Congresses. ; Data encryption (Computer science) ; Congresses. ;

71. Selected areas in cryptography
Author: Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S22
2009eb


72. Selected areas in cryptography
Author: / Eli Biham, Amr M. Youssef (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography--Congresses,Computer security--Congresses,Data encryption (Computer science)--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S22
,
2006


73. Selected areas in cryptography : 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers
Author: Helena Handschuh, M. Anwar Hasan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3357


74. Theory of quantum computation, communication and cryptography
Author: Andrew Childs, Michele Mosca (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses,Quantum communication-- Security measures, Congresses,Quantum computers, Congresses
Classification :
QA76
.
889
.
T63
2009


75. based encryption-Introduction to identity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Public key cryptography. ; Public key infrastructure (Computer security) ;

76. پدافند سایبری سامانه و شبکه کنترل صنعتی : (معماری، پروتکل ها، آسیب پذیری ها، تهدیدات، مخاطرات و راهکارهای مصون سازی سایبری)
Author: / تالیف و تصنیف علی ناصری,پشت جلد به انگلیسی: Ali Naseri. Cyber defense of industrial control system and network,ناصری
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: رمزگذاری دادهها,Data encryption (Computer science),رمزنگاری,Cryptography,کامپیوترها,Computer security,کامپیوترها,Computers,فضای مجازی,Cyberspace, -- رمزگان, -- Code words, -- ایمنی اطلاعات, -- کنترل دستیابی, -- Access control, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02,a03,a03,a04,a04,a05,a05
Classification :
QA
۷۶
/
۹
/
ر
۸
ن
۲ ۱۴۰۰

