241. Computer security and cryptography
Author: Konheim, Alan G., 4391-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25K66


242. Computer security and cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Cryptography. ;

243. Computer security and cryptography
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25K638
2007


244. Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
.
C6373
1993


245. Computer security and industrial cryptography : state of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991
Author: Bart Preneel, Rene Govaeets, Joos Vandewalle, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
L28
Vol
.
741


246. Concurent zero-knowledge
Author: / Alon Rosen,Rosen
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Data encryption (Computer science),Zero - Knowledge proofs,Cryptography
Classification :
QA
76
.
9
.
A25R657


247. Concurrent zero-knowledge
Author: Rosen, Alon
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(,، Zero-knowledge proofs
Classification :
QA
76
.
9
.
A25
.
R653
2006


248. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


249. Contemporary cryptograph
Author: / Rolf Oppliger
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography.,Computer security.
Classification :
Z
,
103
,.
O66
,
2005eb


250. Contemporary cryptography
Author: / Rolf Oppliger
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Cryptography
Classification :
Z103
.
O66
2005


251. Contemporary cryptography
Author: Rolf Oppliger
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Cryptography
Classification :
Z
,
103
,.
O66
,
2005


252. Contemporary cryptography
Author: / Rolf Oppliger
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Cryptography
Classification :
Z103
.
O66
2005


253. Contemporary cryptography
Author: / Rolf Oppliger
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Cryptography
Classification :
Z103
.
O66
2005


254. Contemporary cryptography
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography
Classification :
Z
103
.
O66C6


255. Contemporary cryptography [electronic resource]
Author: / Rolf Oppliger
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Cryptography
Classification :
EB
,
Z103
.
O66
2005

256. Contemporary cryptology
Author: / edited by Gustavus J. Simmons
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Telecommunication systems - Security measures,Cryptography
Classification :
QA
76
.
9
.
A25C6678
1992


257. Contemporary cryptology:the science of information integrity
Author: edited by Gustavus J.Simmons
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer security,، Telecommunication systems- Secusity measures,، Cryptography
Classification :
QA
76
.
9
.
A25C6678


258. Cracking codes with Python :
Author: by Al Sweigart.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Hacking.,Python (Computer program language),Computer security.,COMPUTERS-- Programming Languages-- Python.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Hacking.,Python (Computer program language)
Classification :
QA76
.
9
.
A25
S9317
2018


259. Cryptanalysis of RSA and its variants
Author: / M. Jason Hinek
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication--Security measures--Mathematics,Public key cryptography.,Computer security.
Classification :
TK5102
.
94
.
H56
2010


260. Cryptanalysis of number theoretic ciphers
Author: Wagstaff, Samuel S.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Cryptography,، Number theory
Classification :
QA
76
.
9
.
A25
W33

