321. Malicious cryptography
Author: / Adam Young, Moti Yung
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer viruses--Prevention,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
Y65
,
2004
322. Malicious cryptography :
Author: Adam Young, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer viruses-- Prevention,Cryptography,Data protection
Classification :
QA76
.
9
.
A25
323. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009
324. Modern cryptanalysis : techniques for advanced code breaking
Author: Swenson, Christopher, 3891-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93
325. #Modern cryptography
Author: #Wenbo Mao
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography
Classification :
#
QA
،#.
A25
,
M36
326. Modern cryptography, probabilistic proofs, and pseudorandomness
Author: Goldreich, Oded.
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
G64
1999
327. Modern cryptography, probabilistic proofs and pseudorandomness
Author: Goldreich, Oded, 7591-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25G64
328. Modern cryptography, probabilistic proofs and pseudorandomness
Author: Oded Goldreich
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA
,
76
.
9
,.
A25G64
,
1999
329. .NET security and cryptography /
Author: Peter Thorsteinson and Arun Ganesh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.
330. #.NET security and cryptography
Author: #Peter Thorsteinson and Arun Ganesh
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Cryptography ،Microsoft .NET
Classification :
#
QA
،#.
A25
,
T48
331. .NET security and cryptography
Author: / Peter Thorsteinson and Arun Ganesh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Microsoft .NET
Classification :
QA76
.
9
.
A25
,
T48
2003
332. Novel Cryptographic Primitives and Protocols for Censorship Resistance
Author: Kevin Patrick Dyer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Applied sciences;Censorship circumvention;Computer security;Cryptography;Network security
333. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb
334. Pairing 2009-based cryptography -Pairing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cryptography ; Congresses. ; Computer security ; Congresses. ; Sets of pairs of functions to be distinguished ; Congresses. ; Paarungsbasierte Kryptographie ; Kongress ; Palo Alto ; Paarungsbasierte Kryptographie. ; swd. ;
335. Pairing-based cryptography - Pairing 200
Author: / Hovav Shacham, Brent Waters (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography--Congresses,Computer security--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I55447
,
2009
336. Pairing-based cryptography - Pairing 2008: second international conference, Egham, UK, September 1-3, 2008 ; proceedings
Author: Steven D. Galbraith, Kenneth G. Paterson )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
I55447
337. Practical cryptography
Author: Ferguson, Niels.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Cryptography,، Computer security
Classification :
QA
76
.
9
.
A25
F466
2003
338. Practical cryptography
Author: / Niels Ferguson, Bruce Schneier
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography.,Computer security.
Classification :
QA
,
76
.
9
,.
A25
,
F466
,
2003
339. #Practical cryptography
Author: #Niels Ferguson, Bruce Schneier
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Cryptography ،Computer security
Classification :
#
QA
،#.
A25
F466
340. Primality testing and integer factorization in public-key cryptography
Author: / Song Y. Yan
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Cryptography,Computer Science -- IT
Classification :
QA
76
.
9
.
A25
Y3
2009