1. Advances in Cryptology :
Author: edited by George Robert Blakley, David Chaum.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
2. Advances in Cryptology -- EUROCRYPT '93 :
Author: edited by Tor Helleseth.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Combinatorial analysis.,Data encryption (Computer science)
3. Advances in cryptology -- ASIACRYPT 2018 :
Author: Thomas Peyrin, Steven Galbraith (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
4. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :
Author: edited by Gérard Cohen, Marc Giusti, Teo Mora.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
5. Coding and Cryptology :
Author: Yeow Meng Chee ... [and others (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory, Congresses,Cryptography, Congresses,Coding and Information Theory,Computer Science,Data Encryption,Discrete Mathematics in Computer Science
Classification :
QA268
.
I93
2011
6. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures - Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
2000
7. Coding theory, cryptography and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann...]et al.[, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998
8. Coding theory, cryptography, and related areas: proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998
9. Coding theory, cryptography and related areas: proceedings of and International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: International Conference on Coding Theory, Cryptography, and Related Areas )8991: Guanajuato, Mexico(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Coding theory -- Congresses,، Data encryption )Computer science( -- Congresses,، Data transmission systems -- Security measures -- Congresses
Classification :
TK
5102
.
94
.
I58
10. Constructive side-channel analysis and secure design :
Author: edited by Junfeng Fan, Benedikt Gierlichs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Systems Architecture-- General.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Systems analysis & design.
Classification :
QA76
.
9
.
A25
11. Contemporary cryptology
Author: / Dario Catalano ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Coding theory--Congresses,Information theory--Congresses,Data encryption (Computer science)--Congresses
Classification :
QA
,
268
,.
A375
,
2005
12. Contemporary cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Coding theory ; Congresses. ; Information theory ; Congresses. ; Data encryption (Computer science) ; Congresses. ;
13. Cryptography and Network Security
Author: \ William Stallings.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures.,Data encryption (Computer science),Coding theory.,Computer security.,شبکههای کامپیوتری -- تدابیر ایمنی,رمزگذاری دادهها ,نظریه رمزگذاری
Classification :
TK5105
.
59
.
S71C7
2011
14. Cryptography and Network Security: princilpes and Practice
Author: William Stallings
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- security measures,Data encryption (computer science),Coding theory,Computer security
Classification :
TK
،
5105
.
59
،.
S713
،
2006
15. Cryptography and coding
Author: Matthew G. Parker (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA268
.
C75
2009eb
16. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
F67
2008
17. Cryptography and network security
Author: / William Stallings
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2014
18. Cryptography and network security :
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
E-BOOK
19. Cryptography and network security
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks - Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006
20. Cryptography and network security
Author: / William Stallings
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK
5105
.
59
.
S713
2011