201. CHES 2010--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ; Cryptographie ; Congr?s. ; ram. ; Syst?mes enfouis (informatique) ; Congr?s. ; ram. ; Chiffrement (informatique) ; Congr?s. ; ram. ; Eingebettetes Sys

202. CHES 2002 :--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses ; Cryptography ; Congresses ; Computer security ; Congresses ;

203. CHES 2005--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ;

204. CISSP guide to security essentials /
Author: Peter H. Gregory.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Computer networks-- Examinations.,Computer security-- Examinations.
Classification :
QA76
.
9
.
A25
G7497
2015


205. CRYPTO 2006-Advances in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ;

206. Chaos-based cryptography :
Author: Ljupco Kocarev and Shiguo Lian (Eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Artificial Intelligence (incl. Robotics),Computational Intelligence,Data Encryption,Data Structures, Cryptology and Information Theory
Classification :
QA76
.
9
.
A25
C427
2011eb


207. Chaos-based cryptography :theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev, Shiguo Lian
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C427


208. Chaos-based cryptography: theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev and Shiguo Lian
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C4
2011


209. Chaos-based cryptography : theory, algorithms and applications
Author: Ljupco Kocarev, Shiguo Lian )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography,، Chaotic behavior in systems,، Computer security
Classification :
Z
103
.
C42


210. Chaos synchronization and cryptography for secure communications: applications for encryption
Author: ]edited by[ Santo Banerjee
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Telecommunication,، Chaotic behavior in systems,، Cryptography,، Data encryption )Computer science(,، Synchronization
Classification :
TK
5102
.
94
.
C523


211. Code based cryptography :
Author: Marco Baldi, Edoardo Persichetti, Paolo Santini, (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Public key cryptography, Congresses.,Data encryption (Computer science),Public key cryptography.
Classification :
TK5102
.
94
.
C63
2019


212. Coding and Cryptology :
Author: Yeow Meng Chee ... [and others (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory, Congresses,Cryptography, Congresses,Coding and Information Theory,Computer Science,Data Encryption,Discrete Mathematics in Computer Science
Classification :
QA268
.
I93
2011


213. Coding and cryptology
Author: / Yeow Meng Chee ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Coding theory--Congresses,Cryptography--Congresses,Codierungstheorie--Kongress--Zhangjiajie <2009>,Kryptologie--Kongress--Zhangjiajie <2009>,Codierungstheorie.--swd,Kryptologie.--swd,Kongress.--swd,Zhangjiajie (2009)--swd
Classification :
QA
,
268
,.
I593
,
2009


214. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures - Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
2000


215. Coding theory, cryptography and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann...]et al.[, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


216. Coding theory, cryptography, and related areas: proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


217. Coding theory, cryptography and related areas: proceedings of and International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: International Conference on Coding Theory, Cryptography, and Related Areas )8991: Guanajuato, Mexico(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Coding theory -- Congresses,، Data encryption )Computer science( -- Congresses,، Data transmission systems -- Security measures -- Congresses
Classification :
TK
5102
.
94
.
I58


218. Combinatorial Algorithms
Author: \ Zsuzsanna Lipták, William F. Smyth (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Combinatorial analysis -- Congresses.,Computer algorithms -- Congresses,آنالیز ترکیبی -- کنگرهها,الگوریتمهای کامپیوتری -- کنگرهها
Classification :
QA
164
.
I58
C6
2016
E-Book
,


219. Combinatorial algorithms :
Author: Charles J. Colbourn, Roberto Grossi, Nadia Pisanti (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algorithms, Congresses.,Combinatorial analysis, Congresses.,Algorithms.,Combinatorial analysis.
Classification :
QA164
.
I58
2019


220. Communications and multimedia security :
Author: Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Multimedia systems-- Security measures, Congresses,Telecommunication systems-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I35
2013

