381. Security and privacy in biometrics
Author: Patrizio Campisi, editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Biometric identification-- Security measures,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
S43
2013


382. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


383. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

384. Security and trust management :
Author: Sara Foresti (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithm Analysis and Problem Complexity.,Data Encryption.,Management of Computing and Information Systems.
Classification :
QA76
.
9
.
A25


385. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


386. Security and trust management
Author: Catherine Meadows, Carmen Fernandez-Gago (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S86
2011eb


387. Security for wireless sensor networks using identity-based cryptography /
Author: Harsh Kupwade Patil, Stephen A. Szygenda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers-- Access control.,Data encryption (Computer science),Public key cryptography.

388. Security of block ciphers :
Author: Kazuo Sakiyama, Yu Sasaki, Yang Li
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer algorithms,Computer security-- Mathematics,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


389. Security of information and communication networks
Author: / Stamatios V. Kartalopoulos
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science)
Classification :
TK
5105
.
59
.
K37
2009


390. Security of information and communication networks
Author: / Stamatios V Kartalopoulos
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Reseaux d'ordinateurs -- Securite -- Mesures.,Reseaux d'information -- Securite? -- Mesures.
Classification :
TK
5105
.
59
.
K3
2009


391. Security, privacy, and applied cryptography engineering :
Author: Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


392. Security solutions and applied cryptography in smart grid communications
Author: / Ferrag Ahmed
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Smart power grids--Security measures,Data encryption (Computer science),Computer networks--Security measures
Classification :
TK3105
.
S334
2017


393. Security without obscurity :
Author: Jeff Stapleton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network architectures.,Data encryption (Computer science),Telecommunication-- Security measures.,Computer network architectures.,COMPUTERS / Security / Networking.,Data encryption (Computer science),Telecommunication-- Security measures.
Classification :
TK5102
.
94
.
S73
2018


394. Selected areas in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cryptography ; Congresses. ; Computer security ; Congresses. ; Data encryption (Computer science) ; Congresses. ;

395. Selected areas in cryptography
Author: / Kaisa Nyberg, Howard Heys (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)
Classification :
QA
,
76
.
9
,.
A25
,
S22
,
2002


396. Selected areas in cryptography
Author: Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S22
2009eb


397. Selected areas in cryptography
Author: / Howard Heys, Carlisle Adams (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Data encryption (Computer science)
Classification :
QA
,
76
.
9
,.
A25
,.
S22
,
1999


398. Selected areas in cryptography
Author: / Serge Vaudenay, Amr M. Youssef (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S22
,
2001


399. Selected areas in cryptography
Author: / Eli Biham, Amr M. Youssef (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography--Congresses,Computer security--Congresses,Data encryption (Computer science)--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S22
,
2006


400. Selected areas in cryptography -- SAC 2018 :
Author: Carlos Cid, Michael J. Jacobson Jr. (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25

