401. Selected areas in cryptography : 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers
Author: Helena Handschuh, M. Anwar Hasan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3357


402. Selected areas in cryptography : 5th annual International Workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998 : proceedings
Author: Stafford Tavares, Henk Meijer )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
1556


403. Selected areas in cryptography : 6th annual International Workshop, SAC'99, Kingston, Ontario, Candada, August 9-10, 1999 : proceedings
Author: Howard Heys, Carlisle Adams )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
1758


404. Selected areas in cryptography: 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 : revised papers
Author: Mitsuru Matsui, Robert Zuccherato )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
S22


405. Selected areas in cryptography : 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003 : revised papers
Author: Mitsuru Matsui, Robert Zuccherato )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
3006


406. Selected areas in cryptography : 9th annual international workshop, SAC 2002, St. Johns, Newfoundland, Canada, August 15-16, 2002 : revised papers
Author: Kaisa Nyberg, Howard Heys )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
2595


407. Selected areas in cryptography : 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000 : proceedings
Author: Douglas R. Stinson, Stafford Tavares )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
2012


408. Simple steps to data encryption
Author: Peter Loshin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L684
2013


409. Simple steps to data encryption
Author: Peter Loshin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L684
2013


410. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


411. The design of Rijndael: AES--the Advanced Encryption Standard
Author: Daemen, Joan
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Passwords ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
D32


412. The truth machine :the blockchain and the future of everything
Author: Casey, Michael
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Electronic funds transfers,، Blockchains )Databases(,، Bitcoin,، Data encryption )Computer science(,، Database security
Classification :
HG
1710
.
C373
2018


413. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


414. Theory of Cryptography.
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
TK
5102
.
94
.
T46
2016
E-Book
,


415. Theory of Cryptography
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science),رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها
Classification :
QA
76
.
9
.
T46
2016
E-Book
,


416. Theory of quantum computation, communication and cryptography
Author: Andrew Childs, Michele Mosca (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses,Quantum communication-- Security measures, Congresses,Quantum computers, Congresses
Classification :
QA76
.
889
.
T63
2009


417. Theory of security and applications
Author: Sebastian Mödersheim, Catuscia Palamidessi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
J65
2012eb


418. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


419. Transactions on Data Hiding and Multimedia Security X
Author: \ Yun Q. Shi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),رمزگذاری دادهها,a03,a03,Multimedia systems -- Security measures.,سامانههای چندرسانهای -- تدابیر ایمنی
Classification :
QA
76
.
9
.
T7
2015
E-Book
,


420. Transactions on Large-Scale Data- and Knowledge- Centered Systems XXIII
Author: \ Abdelkader Hameurlain, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Computer networks,کامپیوترها,رمزگذاری دادهها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
D3T7
2016
E-Book
,

