1. Advanced DPA theory and practice
Author: Eric Peeters
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Embedded computer systems-- Security measures
Classification :
TK7895
.
E42
P44
2013
2. Advances of DNA computing in cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Cryptography ; Data processing. ; Molecular computers. ;
3. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگرهها,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,
4. Applied cryptography and network security
Author: \ Jonathan Katz, Moti Yung (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
TK5102
.
94
.
A28
2007
E-Book
,
5. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089
6. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3531
7. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846
8. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28
9. Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of College of Science University of Tehran (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
85
.
A26
2005
10. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings
Author: John Ioannidis, angelos keromytis, moti Yung (eds)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses
Classification :
TK
،
5102
.
85
،.
A26
،
2005
11. Broadband quantum cryptography /
Author: Daniel J. Rogers
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Broadband communication systems-- Security measures,Cryptography,Data encryption (Computer science),Quantum communication
Classification :
QA76
.
9
.
A25
R64
2010
12. Broadband quantum cryptography
Author: Rogers, Daniel J.
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Broadband communication systems,، Quantum communication
Classification :
QA
76
.
9
.
A25
R64
2010
13. Chaos synchronization and cryptography for secure communications: applications for encryption
Author: ]edited by[ Santo Banerjee
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Telecommunication,، Chaotic behavior in systems,، Cryptography,، Data encryption )Computer science(,، Synchronization
Classification :
TK
5102
.
94
.
C523
14. Computer security and cryptography
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)
Classification :
Z103
.
A2
K638
2007
15. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34
16. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007
17. Cryptography and network security
Author: / by William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
59
.
S713
2008
18. Cryptography and secure communication
Author: Blahut, Richard E.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Telecommunication
Classification :
QA
76
.
9
.
A25
.
B569
19. Cryptology :
Author: Richard Klima, Neil Sigmon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science),Ciphers.,COMPUTERS / Security / Cryptography.,Cryptography-- Data processing.,Cryptography.,Data encryption (Computer science)
Classification :
TK5102
.
94
20. Data hiding fundamentals and applications :
Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.
Classification :
QA76
.
H877
2004