81. Internet security
Author: / Man Young Rhee
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Internet --Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R4
2003


82. Internet security
Author: / Man Young Rhee
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
E-BOOK

83. Internet security
Author: / Man Young Rhee
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
,.
R447
2003


84. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003


85. Internet security :cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Internet,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447


86. Internet security. cryptographic principles, algorithms, and protocols
Author: / Man Young Rhee
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
.
R447


87. Internet security: cryptographic principles, algorithms, and protocols [electronic resource]
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57
,.
R447
2003

88. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008


89. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


90. Introduction to cryptography with mathematical foundations and computer implementations
Author: / Alexander Stanoyevitch
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Coding theory,Cryptography -- Data processing,Cryptography -- Mathematics,Data encryption (Computer science)
Classification :
QA268
.
S73C8


91. Introduction to cryptography with mathematical foundations and computer implementations
Author: / Alexander Stanoyevitch
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Coding theory,Cryptography -- Data processing,Cryptography--Mathematics.,Data encryption (Computer science)
Classification :
QA
268
.
S73
2011


92. Introduction to cryptography with mathematical foundations and computer implementations
Author: Alexander Stanoyevitch
Library: Vali Asr University Central Library (Kerman)
Subject: Coding theory,Cryptography--Data processing,Cryptography--Mathematics,Data encryption )Computer science(
Classification :
QA
268
.
S73
2011


93. Introduction to cryptography with open-source software /
Author: Alasdair McAndrew.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography-- Mathematics.,Data encryption (Computer science),Open source software.

94. Introduction to identity-based encryption
Author: / Luther Martin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008


95. Introduction to identity-based encryption
Author: / Luther Martin
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA
76
.
9
.
A25
M374
2008


96. Java cryptography /
Author: Jonathan Knudsen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Java (Computer program language),Computer programming-- Management,Computer security
Classification :
QA76
.
73
.
J38
K683
1998


97. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb


98. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


99. Modern cryptanalysis : techniques for advanced code breaking
Author: Christopher Swenson
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93


100. Networked RFID systems and lightweight cryptography
Author: / Peter H. Cole, Damith C. Ranasinghe, editiors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Radio frequency identification systems.,Data encryption (Computer science),Cryptography.
Classification :
TK
,
6570
,.
I34
,
N47
,
2008

