21. Information security: a practical approach
Author: Bhaskar, S. M.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Public key cryptography
Classification :
QA
76
.
9
.
A25
B473
2008


22. Internet security
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57R447
2003

23. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003


24. Internet security
Author: / Man Young Rhee
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Internet --Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R4
2003


25. Internet security
Author: / Man Young Rhee
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
E-BOOK

26. Internet security
Author: / Man Young Rhee
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
,.
R447
2003


27. Internet security :cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Internet,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447


28. Internet security. cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.,Man Young Rhee
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Internet- Security measures,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447


29. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003

30. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008


31. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


32. Introduction to identity-based encryption
Author: / Luther Martin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008


33. Introduction to identity-based encryption
Author: / Luther Martin
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA
76
.
9
.
A25
M374
2008


34. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


35. Public-Key Cryptography – PKC 2015
Author: \ Jonathan Katz (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Public key cryptography -- Congresses.,Data encryption (Computer science),Systems and Data Security.,رمزنگاری کلید عمومی -- کنگره ها,رمزگذاری دادهها
Classification :
QA76
.
9
.
P81
2015
E-Book
,


36. #Public key cryptography
Author: #David Naccache, Pascal Paillier )eds.(
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security- Congresses ،Computers- Access control- Congresses ،Data encryption )Computer science(- Congresses ،Public key cryptography- Congresses
Classification :
#
QA
،#.
A25
,
I567
،#
2002


37. Public key cryptography
Author: / David Naccache, Pascal Paillier (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computers -- Access control,Data encryption (Computer science),Public key cryptography
Classification :
QA
76
.
9
.
A25
I567
2002


38. Public key cryptography, PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I5555
2006


39. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002; proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I567
2002


40. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses
