401. Quantum communications and cryptography
Author: / edited by Alexander V. Sergienko
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Quantum communication--Security measures,Cryptography.,Coding theory.,Data encryption (Computer science),Quantum communication.
Classification :
TK
,
5102
.
94
,.
Q36
,
2005

403. Quantum private communication
Author: Guihua Zeng
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
TK
،
5102
.
94
،.
Z46
،
2010

404. Quantum private communication
Author: / Guihua Zeng
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
E-BOOK
405. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK
406. Secret history :
Author: Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography-- History,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B384
2013

408. Security and cryptography for networks
Author: / Roberto De Prisco, Moti Yung (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
TK
,
5105
.
59
,.
S385
,
2006
QA
,
75
,.
L4
,
vol
.,
4116

409. Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings
Author: Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
TK
5105
.
59
.
S385

410. Security for wireless sensor networks using identity-based cryptography /
Author: Harsh Kupwade Patil, Stephen A. Szygenda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers-- Access control.,Data encryption (Computer science),Public key cryptography.
411. Security in communication networks : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers
Author: Carlo Blundo, Stelvio Cimato )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3352

412. Security in communication networks :third international conference, SCN 2002, Amalfi, Italy, September 2002 : revised papers
Author: Stelvio Cimato, Clemente Galdi, Giuseppe Persiano )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2576

416. Security protocols :
Author: Mark Lomas, ed.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Cryptographie, Congrès.,Ordinateurs-- Accès-- Contrôle, Congrès.,Sécurité informatique, Congrès.,Computabilidade e modelos de computacao.,Computer security, Congresses.,Computer security.,Computers-- Access control, Congresses.,Computers-- Access control.,Cryptographie-- Congrès.,Cryptography, Congresses.,Cryptography.,Databescherming.,Gegevens.,Geheimschrift.,Ordinateurs-- Accès-- Contrôle-- Congrès.,Systèmes informatiques-- Mesures de sûreté-- Congrès.
Classification :
QA76
.
9
.
A25
C826
1996

417. Security protocols
Author: / Bruce Christianson ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S45
,
1999

418. Security protocols
Author: / Mark Lomas, ed
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
C826
,
1996

419. Security protocols
Author: / Bruce Christianson ... [et al.], (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S44
,
2000

420. Security protocols
Author: / Bruce Christianson ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I574
,
2005
