1. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures -- Congresses ، Computer networks,Congresses ، Computer security
Classification :
TK
5105
.
59
.
N38
2000
2. Advanced security technologies in networking
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer networks-- Security measures,Congresses ، Computer security
Classification :
TK
5105
.
59
.
N33
2000
3. Advances in Cryptology -- EUROCRYPT 2019 :
Author: Yuval Ishai, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
4. Advances in Cryptology – EUROCRYPT 2015
Author: \ edited by Elisabeth Oswald, Marc Fischlin.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA76
.
9
.
A38
2015
E-Book
,
5. Advances in computer science and information technology
Author: / Natarajan Meghanathan, Nabendu Chaki, Dhinaharan Nagamalai (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Congresses,Computer networks--Security measures--Congresses,Wireless communication systems--Congresses
Classification :
TK5105
.
5
.
I58
2012
6. Advances in cryptology -- EUROCRYPT 2018 :
Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25
7. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011
8. Advances in information and computer security
Author: / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computer networks, Access control, Congresses,Computer networks, Security measures, Congresses
Classification :
QA76
.
9
.
A25I58
2010
9. Advances in intelligent information hiding and multimedia signal processing :
Author: editors, Jeng-Shyang Pan, Jianpo Li, Pei-Wei Tsai and Lakhmi C. Jain.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Image processing, Congresses.,Multimedia systems-- Security measures, Congresses.,Signal processing, Congresses.,Computer networks-- Security measures.,Computer security.,Image processing.,Signal processing.
Classification :
QA76
.
9
.
A25
10. Advances in network and distributed systems security
Author: edited by Bart de Decker ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.
11. Advances in security technology
Author: Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
S438
2008eb
12. Algorithms in applications
Author: editors: Utpal Sharma, Dhruba K. Bhattacharyya
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Algorithms,Congresses ، Computer networks -- Security measures,Congresses ، Pattern recognition systems,Congresses ، Soft computing
Classification :
QA
9
.
58
.
A43
13. Applications and techniques in information security :
Author: Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
14. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
15. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
16. Applied Cryptography and Network Security
Author: \ Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
17. Applied Cryptography and Network Security
Author: \ [Edited by] Michael Jacobson...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
18. Applied Cryptography and Network Security.
Author: \ [edited by] Tal Malkin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Cloud computing -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,محاسبات ابری -- کنگره ها
Classification :
QA
76
.
9
.
A66
2015
E-Book
,
19. Applied Cryptography and Network Security
Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها
Classification :
E-Book
,