41. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008
42. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017
43. Introduction to cryptography with open-source software /
Author: Alasdair McAndrew.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography-- Mathematics.,Data encryption (Computer science),Open source software.
44. Introduction to identity-based encryption
Author: Martin, Luther
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Data encryption )Computer science(,، Public key cryptography,، Public key infrastructure )Computer security(
Classification :
QA
76
.
9
.
A25
M374
2008
45. Introduction to identity-based encryption
Author: / Luther Martin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA
,
76
.
9
,.
A25
,
M374
,
2008
46. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb
47. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009
48. Modern cryptanalysis : techniques for advanced code breaking
Author: Swenson, Christopher, 3891-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93
49. Progress in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Malaysia ; Congresses. ; Cryptography ; Malaysia ; Congresses. ; Data encryption (Computer science) ; Malaysia ; Congresses. ; Data protection ; Malaysia ; Congresses. ;
50. Progress in cryptology
Author: / Ed Dawson, Serge Vaudenay (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Malaysia--Congresses,Cryptography--Malaysia--Congresses,Data encryption (Computer science)--Malaysia--Congresses,Data protection--Malaysia--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5537
,
2005
51. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011
52. Progress in cryptology - INDOCRYPT 2018 :
Author: Debrup Chakraborty, Tetsu Iwata (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science),Data mining.,Data structures (Computer science),Software engineering.
Classification :
QA76
.
9
.
D335
P76
2018
53. Progress in cryptology : Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings
Author: Ed Dawson, Serge Vaudenay )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security -- Malaysia,Congresses ، Cryptography -- Malaysia,Congresses ، Data encryption )Computer Science( -- Malaysia,Congresses ، Data protection -- Malaysia
Classification :
QA
76
.
L28
Vol
.
3715
54. Public-Key Cryptography – PKC 2015
Author: \ Jonathan Katz (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Public key cryptography -- Congresses.,Data encryption (Computer science),Systems and Data Security.,رمزنگاری کلید عمومی -- کنگره ها,رمزگذاری دادهها
Classification :
QA76
.
9
.
P81
2015
E-Book
,
55. #Public key cryptography
Author: #David Naccache, Pascal Paillier )eds.(
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security- Congresses ،Computers- Access control- Congresses ،Data encryption )Computer science(- Congresses ،Public key cryptography- Congresses
Classification :
#
QA
،#.
A25
,
I567
،#
2002
56. Public key cryptography, PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I5555
2006
57. Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 ; proceedings
Author: David Naccache, Pascal Paillier )eds.(
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer security,، Computers -- Access control,، Data encryption )Computer science(,، Public key cryptography
Classification :
QA
76
.
9
.
A25
I567
2002
58. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002; proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I567
2002
59. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses
60. Quantum communications and cryptography
Author: edited by Alexander V. Sergienko
Library: (Semnan)
Subject: Security measures ، Quantum communication,، Cryptography,، Coding theory,، Data encryption )Computer science(,، Quantum communication
Classification :
TK
5102
.
94
.
Q83