61. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
پدیدآورنده : John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
رده :
QA
76
.
L28
Vol
.
3531
62. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
پدیدآورنده : Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
رده :
QA
76
.
L28
Vol
.
2846
63. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
پدیدآورنده : Steven M. Bellovin ... ]et al.[ )eds.(
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
رده :
TK
5102
.
94
.
A28
64. Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
پدیدآورنده : John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
کتابخانه: Library of College of Science University of Tehran (Tehran)
موضوع : Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
رده :
TK
5102
.
85
.
A26
2005
65. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings
پدیدآورنده : John Ioannidis, angelos keromytis, moti Yung (eds)
کتابخانه: Central Library and Information Center of Shahed University (Tehran)
موضوع : Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses
رده :
TK
،
5102
.
85
،.
A26
،
2005
66. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
67. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
کتابخانه: Central Library of Amirkabir University of Technology (Tehran)
موضوع : Computer security, Telecommunication - Security measures, Cryptography
رده :
QA
76
.
9
.
A25
S35
1996
68. Applied cryptography: protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : ، Computer security,Security measures ، Telecommunication,، Cryptography
رده :
QA
76
.
9
.
A25
S35
1996
69. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Bruce Schneier
کتابخانه: Campus International Library of Kish University of Tehran (Hormozgan)
موضوع : Computer security,Telecommunication--Security measure,Cryptography
70. Applied cryptography: protocols, algorithms, and source code in C [electronic resource]
پدیدآورنده : / Bruce Schneier
کتابخانه: Imam Reza International University library and information center (Khorasan Razavi)
موضوع : Computer security,Telecommunication--Security measures,Cryptography
رده :
EB
,
QA76
.
9
.
A25
,
S35
1996
71. Applied cryptography :protocols, algorithms, and source code in C ruce Schneier
پدیدآورنده : Schneier, Bruce
کتابخانه: Central Library and Documentation Center (Semnan)
موضوع : ، Computer security,، Telecommunicatio--Security measures,، Cryptography
رده :
QA
76
.
9
.
A25S35
1996
72. Applied public key infrastructure :
پدیدآورنده : edited by Jianying Zhou [and others].
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
رده :
QA76
.
9
.
A25
I558
2005eb
73. Applied public key infrastructure
پدیدآورنده :
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : key cryptography ; Congresses. ; -Public key infrastructure (Computer security) ; Congresses. ; Public
74. Applied quantum cryptography
پدیدآورنده :
کتابخانه: Central Library and Document Center of Arak University (Markazi)
موضوع : Photon detectors,Quantum cryptography,Computer security,Quantum theory
رده :
005
.
82
A652
75. Authentication systems for secure networks
پدیدآورنده : Oppliger, Rolf
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
رده :
TK
5105
.
59
.
O62
76. Authentication systems for secure networks
پدیدآورنده : Oppliger, Rolf.
کتابخانه: Central Library of Amirkabir University of Technology (Tehran)
موضوع : Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
رده :
TK
5105
.
59
.
O77
1996
77. #Beginning cryptography with Java
پدیدآورنده : #David Hook
کتابخانه: Central Library of Esfehan University of Technology (Esfahan)
موضوع : Computer security ،Cryptography ،Public key infrastructure )Computer security( ،Java )Computer program language(
رده :
#
QA
،#.
A25
H645
78. Beginning cryptography with Java
پدیدآورنده : / David Hook
کتابخانه: Central Library and Archive Center of shahid Beheshti University (Tehran)
موضوع : Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
رده :
005
.
8
H781B
2005
79. Beginning cryptography with Java
پدیدآورنده : / David Hook
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
رده :
QA76
.
9
.
A25
,
H645
2005
80. Boolean functions in cryptology and information security
پدیدآورنده : / edited by Bart Preneel and Oleg A. Logachev
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses
رده :
E-BOOK