1. Public key cryptography
المؤلف: / Hideki Imai, Yuliang Zheng, eds
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
رده :
QA
,
76
.
9
,.
A25
,
I567
,
1999


2. Public key cryptography
المؤلف: / Hideki Imai, Yuliang Zheng (eds.)
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
رده :
QA
,
76
.
9
,.
A25
,
I567
,
1998


3. Public key cryptography
المؤلف: / Hideki Imai, Yuliang Zheng (eds.)
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
رده :
QA
,
76
.
9
,.
A25
,
I567
,
2000


4. Public key cryptography : Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
المؤلف: Hideki Imai, Yuliang Zheng )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Data encryption )Computer science(
رده :
QA
76
.
L28
Vol
.
1560


5. Public key cryptography : first International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, Febuary 5-6 : proceedings
المؤلف: Hideki Imai, Yuliang Zheng )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Data encryption )Computer science(
رده :
QA
76
.
L28
Vol
.
1431


6. Public key cryptography : third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings
المؤلف: Hideki Imai, Yuliang Zheng )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Data encryption )Computer science(
رده :
QA
76
.
L28
Vol
.
1751

