1. Authentication systems for secure networks
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


2. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


3. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34


4. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007


5. Cryptography and network security
پدیدآورنده : Behrouz A. Forouzan
موضوع : Computer networks- Security measures,Cryptography
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
6. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672


7. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672
2008


8. Cryptography and network security
Author: / by William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
59
.
S713
2008


9. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


10. Cryptology and network security
Author: / Feng Bao ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5538
,
2007


11. Cryptology and network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Cryptography ; Congresses. ; Authentifikation. ; swd. ; Computersicherheit. ; swd. ; Datensicherung. ; swd. ; Kryptoanalyse. ; swd. ; Kryptosystem. ; swd. ; Passwort. ; swd. ; Privatsph?re. ; swd. ; Re

12. Cryptology and network security :6th international conference, CANS 2007 Singapore, December 8-10 2007 : proceedings
Author: ]edited by[ Feng Bao, San Ling, Tatsuaki Okamoto
Library: Library of Niroo Research Institue (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25I5538
2007


13. Disappearing cryptograph
Author: / Peter Wayner
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Cryptography.,Internet.
Classification :
TK
,
5105
.
59
,.
W39
,
2009


14. Disappearing cryptography
Author: Peter Wayner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cryptography,Internet
Classification :
TK5105
.
59
.
W39
2009


15. Disappearing cryptography: information hiding: steganography & watermarking
Author: Wayner, Peter
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography,، Internet
Classification :
TK
5105
.
59
.
W39
2002


16. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007


17. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
C598
2003


18. Hiding in plain sight :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer networks ; Security measures ;

19. Hiding in plain sight
Author: / Eric Cole
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography,Computer networks, Security measures
Classification :
QA76
.
9
.
A25C598
2003


20. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C598
,
2003

