341. Quantum communications and cryptography
Author: edited by Alexander V. Sergienko
Library: (Semnan)
Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication
Classification :
TK
5102
.
94
.
Q83
342. Quantum communications and cryptography
Author: edited by Alexander V. Sergienko
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication
Classification :
TK
5102
.
94
.
Q36
2006
343. Quantum communications and cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Quantum communication ; Security measures ; Cryptography ; Coding theory ; Data encryption (Computer science) ; Quantum communication ;
344. Quantum communications and cryptography
Author: / edited by Alexander V. Sergienko
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Quantum communication--Security measures,Cryptography.,Coding theory.,Data encryption (Computer science),Quantum communication.
Classification :
TK
,
5102
.
94
,.
Q36
,
2005
345. Quantum private communication
Author: Guihua Zeng
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
TK
،
5102
.
94
،.
Z46
،
2010
346. Quantum private communication
Author: / Guihua Zeng
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Quantum communication, Security measures,Cryptography,Coding theory,Data encryption (Computer science)
Classification :
E-BOOK
347. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK
348. Recent trends in network security and applications :
Author: Natarajan Meghanathan ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.
349. Research in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ; Cryptography ; Congresses. ;
350. Satellite encryption
Author: Vacca, John R.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Artificial satellites in telecommunication,، Cryptography,، Data encryption )Computer science(
Classification :
TK
5102
.
94
.
V33
351. Secret history :
Author: Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography-- History,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B384
2013
352. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25
353. Security, Privacy, and Applied Cryptography Engineering
Author: \ Claude Carlet, M. Anwar Hasan, Vishal Saraswat (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
E-Book
,
354. Security, Privacy, and Applied Cryptography Engineering :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;
355. Security, Privacy, and Applied Cryptography Engineering
Author: \ Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,
356. Security, Privacy, and Applied Cryptography Engineering
Author: \ Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Computer security,رمزگذاری دادهها,کامپیوترها, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
S7
2015
E-Book
,
357. Security and cryptography for networks :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ;
358. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
359. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018
360. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011