1. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


2. Data and Applications Security and Privacy XXIV
Author: / Sara Foresti, Sushil Jajodia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

3. Data and applications security and privacy XXIV
Author: / Sara Foresti, Sushil Jajodia (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25I35
2010


4. Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures
Author: / Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati (auth.), Alessandro Aldini, Roberto Gorrieri (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK

5. Preserving Privacy in Data Outsourcing
Author: /Sara foresti
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject:

6. Preserving Privacy in Data Outsourcing
Author: / Sara Foresti
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

7. Preserving privacy in data outsourcing
Author: Sara Foresti ; foreword by Pierangela Samarati
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security
Classification :
QA76
.
9
.
A25
F67
2010eb


8. Preserving privacy in data outsourcing
Author: Foresti, Sara.,Sara Foresti ; foreword by Pierangela Samarati
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Data protection,، Electronic data processing departments, Contracting out,، Computer networks, Security measures
Classification :
HF
5548
.
37
.
F66
2011


9. Preserving privacy in data outsourcing
Author: / Sara Foresti
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Data protection,Electronic data processing departments--Contracting out.,Computer networks--Security measures
Classification :
HF
5548
.
37
.
F6
2011


10. 23, 2010. Proceedings-Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21
Author: / Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi (auth.), Sara Foresti, Sushil Jajodia (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

11. Security and Trust Management
Author: \ Sara Foresti (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


12. Security and Trust Management
Author: / Sara Foresti
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

13. Security and trust management :
Author: Sara Foresti (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithm Analysis and Problem Complexity.,Data Encryption.,Management of Computing and Information Systems.
Classification :
QA76
.
9
.
A25

