281. Multimedia content encryption
Author: / Shiguo Lian
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Multimedia systems--Security measures,Data encryption (Computer science),Data protection.

282. Multimedia content encryption: techniques and applications
Author: / Shiguo Lian
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Multimedia systems,Data encryption (Computer science),Data protection,-- Security measures
Classification :
005
.
82
L693M
2009


283. Multimedia forensics and security /
Author: Chang-Tsun Li [editor]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures
Classification :
QA76
.
575
.
M83187
2009


284. Multimedia forensics and security
Author: / Chang-Tsun Li [editor]
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Multimedia systems- Security measures,Data encryption (Computer science),Data protection
Classification :
QA76
.
575
.
M831
2009


285. Multivariate public key cryptosystems
Author: / by Jintai Ding, Jason E. Gower and Dieter S. Schmidt.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computers -- Access control,Data encryption (Computer science),Computer security,a04,a06,a06
Classification :
QA76
.
9
.
A25
D5635
2006


286. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


287. New stream cipher designs: the eSTREAM finalists
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، eSTREAM )Project(,، Computer security,، Data encryption )Computer science(,، Stream ciphers,، Coding theory
Classification :
QA
76
.
9
.
A25
.
N486
2008


288. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001


289. PKG 2003 :-Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ; Public key cryptography ; Congresses ;

290. Pairing-based cryptography-- Pairing 2012
Author: Michel Abdalla, Tanja Lange (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012


291. Post-quantum cryptography
Author: \ Tsuyoshi Takagi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Quantum computers -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترهای کوانتومی -- کنگره ها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
P6
2016
E-Book
,


292. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


293. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


294. Principles of Security and Trust
Author: \ Martín Abadi, Steve Kremer (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses. ,Data encryption (Computer science) -- Congresses. ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA76
.
9
.
A25
P66
2015
E-Book
,


295. Principles of security and trust :
Author: Flemming Nielson, David Sands (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
P67
2019eb


296. Principles of security and trust :
Author: Lujo Bauer, Ralf Küsters (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer science.,Computer security.,Computer security.,Computers-- Computer Science.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Systems analysis & design.
Classification :
QA76
.
9
.
A25
P67
2018eb


297. Principles of security and trust :
Author: David Basin, John C. Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
D385
2013


298. Privacy Technologies and Policy
Author: \ Bettina Berendt, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),کامپیوترها,رمزگذاری دادهها, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
A5
2016
E-Book
,


299. Privacy technologies and policy :
Author: Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


300. Privacy technologies and policy :
Author: Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25

