321. Proceedings of seventh ACM Symposium on Access Control Models and Technologies : SACMAT 2002 : June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA
Author: Sponsored by ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Congresses ، Computer security,Congresses ، Computer networks
Classification :
QA
76
.
6
.
A29
2002


322. Proceedings of ]the[ sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001, Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
Author: sponsored by the ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer programming,Congresses ، Computers -- Access control,Congresses ، Computer security
Classification :
QA
76
.
6
.
A29
2001


323. Professional rootkits
Author: Vieler, Ric
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Rootkits )Computer software(,Access control ، Computers,، Computer security
Classification :
QA
76
.
9
.
A25
V56
2007


324. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009


325. Progress in cryptology - LATINCRYPT 2017 :
Author: Tanja Lange, Orr Dunkelman (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control.,Cryptography.,Computer security.,Computers-- Access control.,Cryptography.
Classification :
QA76
.
9
.
A25
P76
2019


326. Public-key cryptography
Author: Arto Salomaa,Title
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computers - Access control,Cryptography
Classification :
QA
.
A25S26
76
.
9
1990


327. Public key cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ;

328. Public-key cryptography
Author: / Arto Salomaa.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computers,Public key cryptography,-- Access control
Classification :
005
.
82
S173P
1996
20


329. Public key cryptography
Author: / Hideki Imai, Yuliang Zheng, eds
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I567
,
1999


330. #Public key cryptography
Author: #David Naccache, Pascal Paillier )eds.(
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security- Congresses ،Computers- Access control- Congresses ،Data encryption )Computer science(- Congresses ،Public key cryptography- Congresses
Classification :
#
QA
،#.
A25
,
I567
،#
2002


331. Public-key cryptography
پدیدآورنده : Salomaa, Arto.
موضوع : ، Computers-- Access control,، Cryptography
۵ نسخه از این کتاب در ۳ کتابخانه موجود است.
332. Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Computer security ; Congresses. ; Computers ; Access control ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Public

333. Public-key cryptography
Author: Salomaa, Arto
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computers - Access control,، Cryptography
Classification :
QA
76
.
9
.
A25
S26
1990


334. Public key cryptography
Author: / Hideki Imai, Yuliang Zheng (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I567
,
1998


335. Public key cryptography
Author: / Hideki Imai, Yuliang Zheng (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I567
,
2000


336. Public key cryptography
Author: / Ronald Cramer, ed
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computers--Access control--Congresses,Data encryption (Computer science)--Congresses,Public key cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I567
,
2008


337. Public-key cryptography :
Author: Paul Garrett, Daniel Lieman, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control, Congresses,Public key cryptography, Congresses
Classification :
QA614
.
85
.
A44
2005


338. Public key cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ;

339. Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computers ; Access control ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Public key cryptography ; Congresses. ;

340. Public-key cryptography
Author: Salomaa, Arto, 4391-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computers -- Access control,، Public key cryptography
Classification :
QA
76
.
9
.
A25S2
1996

