61. Fully homomorphic encryption in real world applications /
Author: Ayantika Chatterjee, Khin Mi Mi Aung.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography-- Mathematics.,Data encryption (Computer science)-- Mathematics.,Homomorphisms (Mathematics),Cryptography-- Mathematics.,Homomorphisms (Mathematics),SCIENCE-- System Theory.,TECHNOLOGY & ENGINEERING-- Operations Research.
Classification :
QA268
62. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010
63. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010
64. Hiding behind the keyboard :
Author: Brett Shaves, John Bair
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Undercover operations
Classification :
HV8080
.
U5
S34
2016
65. Hiding behind the keyboard : uncovering covert communication methods with forensic analysis
Author: Shavers, Brett
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Undercover operations,، Data encryption )Computer science(,، Cryptography
Classification :
HV
8080
.
U5S53
66. Information security and cryptology :
Author: Xuejia Lai, Moti Yung, Dongdai Lin (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5525
2010eb
67. Information security and cryptology
Author: Feng Bao ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
76
.
O63
68. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.
69. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;
70. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb
71. Innovative cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Telecommunication ; Security measures. ; Cryptography. ;
72. Innovative cryptography
Author: / Nick Moldovyan, Alex Moldovyan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Telecommunication--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
M665
,
2007
73. Innovative cryptography /
Author: Nick Moldovyan, Alex Moldovyan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Telecommunication-- Security measures
Classification :
QA76
.
9
.
A25
M665
2007
74. Internet security
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57R447
2003
75. Internet security
Author: / Man Young Rhee
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Internet --Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R4
2003
76. Internet security
Author: / Man Young Rhee
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
E-BOOK
77. Internet security
Author: / Man Young Rhee
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
875
.
I57
,.
R447
2003
78. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003
79. Internet security :cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Internet,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447
80. Internet security. cryptographic principles, algorithms, and protocols
Author: Rhee, Man Young.,Man Young Rhee
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Internet- Security measures,، Data encryption )Computer science(,، Public key cryptography
Classification :
TK
5105
.
875
.
I57
.
R447