21. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011
22. Advances of DNA computing in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;
23. Algebraic aspects of the Advanced encryption standard /
Author: by Carlos Cid, Sean Murphy, Matthew Robshaw.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Standards.,Computers-- Access control-- Standards.,Data encryption (Computer science)-- Standards.,Computer security-- Standards.,Computer security-- Standards.,Computers-- Access control-- Standards.,Computers-- Access control-- Standards.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science)-- Standards.,Informatique.
Classification :
QA76
.
9
.
A25
C43
2006eb
24. Algebraic cryptanalysis
Author: Bard, Gregory V.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(
Classification :
Z
103
.
B32A4
25. Algebraic cryptanalysis
Author: Bard, Gregory V.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(
Classification :
Z
103
.
B37
2009
26. Algorithmic problems of group theory, their complexity, and applications to cryptography
Author: Delaram Kahrobaei, Vladimir Shpilrain, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Group theory,Congresses ، Noncommutative algebras,Congresses ، Algorithms,Congresses ، Cryptography,Congresses ، Data encryption )Computer science(,Congresses ، Algebra
Classification :
QA
176
.
A43
27. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :
Author: edited by Gérard Cohen, Marc Giusti, Teo Mora.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
28. Applied Cryptography and Network Security
Author: \ [Edited by] Steven M. Bellovin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,
29. Applied Cryptography and Network Security
Author: \ Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Systems and Data Security.,Data Encryption.,رمزگذاری دادهها
Classification :
E-Book
,
30. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگرهها,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,
31. Applied Cryptography and Network Security
Author: \ [Edited by] Michel Abdalla...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,
32. Applied Cryptography and Network Security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;
33. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
34. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
35. Applied Cryptography and Network Security
Author: \ Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
36. Applied Cryptography and Network Security
Author: \ Jianying Zhou, Moti Yung, Feng Bao (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,
37. Applied Cryptography and Network Security
Author: \ [Edited by] Michael Jacobson...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
38. Applied Cryptography and Network Security.
Author: \ [edited by] Tal Malkin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Cloud computing -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,محاسبات ابری -- کنگره ها
Classification :
QA
76
.
9
.
A66
2015
E-Book
,
39. Applied Cryptography and Network Security
Author: \ Markus Jakobsson, Moti Yung, Jianying Zhou (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,
40. Applied Cryptography and Network Security
Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها
Classification :
E-Book
,