1. Applied Cryptography and Network Security
Author: / Jianying Zhou, Moti Yung
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

2. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

3. Applied Cryptography and Network Security
Author: \ Jianying Zhou, Moti Yung, Feng Bao (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

4. Applied Cryptography and Network Security
Author: \ Markus Jakobsson, Moti Yung, Jianying Zhou (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

5. Applied Cryptography and Network Security
Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها
Classification :
E-Book
,

6. Applied Cryptography and Network Security
Author: / Feng Bao, Pierangela Samarati, Jianying Zhou
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

7. Applied cryptography and network security
Author: \ Jianying Zhou, Moti Yung, Yongfei Han, (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: مخابرات--اقدامات تامینی -- کنگره ها,Telecommunication -- Security measures -- Congresses.
Classification :
TK5102
.
94
.
A28
2003
E-book
,


8. Applied cryptography and network security
Author: Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2012eb


9. Applied cryptography and network security
Author: / Markus Jakobsson , Moti Yung , Jianying Zhou (eds.)
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Telecommunication -- Security measures -- congresses,Data encription (Computer science),Criptography -- congresses
Classification :
TK
5102
.
94
.
A28
2004


10. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010


11. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089


12. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846


13. Applied public key infrastructur
Author: / edited by Jianying Zhou ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I558
,
2005eb


14. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


15. Information Security
Author: / Xuejia Lai, Jianying Zhou, Hui Li
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

16. Information Security
Author: edited by Xuejia Lai, Jianying Zhou, Hui Li.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Software engineering.

17. Information Security Practice and Experience
Author: / Xinyi Huang, Jianying Zhou
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

18. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
Author: / Claudio A. Ardagna, Jianying Zhou
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

19. Information Security and Cryptology
Author: / Dongdai Lin, Moti Yung, Jianying Zhou
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

20. Information Security and Cryptology
Author: \ Dongdai Lin, Moti Yung, Jianying Zhou (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data Encryption.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,

