61. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


62. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

63. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

64. Public Key Cryptography ђ́أ PKC 2012
Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

65. RFID Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Engineering. ; Computer Communication Networks. ; Data encryption (Computer science). ; Electronics. ; Telecommunication. ; Systems engineering. ; Engineering. ; Circuits and Systems. ; Signal, Image and Speech Processing. ; Communications Engineering, Ne

66. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


67. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

68. Security and Privacy \U+2013\ Silver Linings in the Cloud
Author: edited by Kai Rannenberg, Vijay Varadharajan, Christian Weber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

69. Security and Privacy in Mobile Information and Communication Systems
Author: edited by Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

70. Security and Trust Management
Author: edited by Catherine Meadows, Carmen Fernandez-Gago
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

71. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


72. Security and privacy in communication networks
Author: / Muttukrishnan Rajarajan ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication systems--Security measures--Congresses,Computer networks--Security measures--Congresses,Data encryption (Computer science)--Congresses
Classification :
TK5102
.
85
.
S43
2012


73. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


74. Security of information and communication networks
Author: / Stamatios V. Kartalopoulos
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science)
Classification :
TK
5105
.
59
.
K37
2009


75. Security of information and communication networks
Author: / Stamatios V Kartalopoulos
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Reseaux d'ordinateurs -- Securite -- Mesures.,Reseaux d'information -- Securite? -- Mesures.
Classification :
TK
5105
.
59
.
K3
2009


76. Security of information and communication networks
Author: Kartalopoulos, Stamatios V.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks ► Data encryption (Computer science)
Classification :
005
.
K18s


77. Smart card research and advanced applications :
Author: Emmanuel Prouff (edition)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Smart cards, Congresses
Classification :
TK7895
.
S62
C37
2011


78. Subspace learning of neural networks
Author: / Jian Cheng Lv, Jiliu Zhou, Zhang Yi.,Cheng Lv, Jian,
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Neural networks (Computer science).,Computer algorithms.,Computer science.,Neural networks.,Computer algorithms.

79. The Handbook of Data Communications and Networks :
Author: by W.J. Buchanan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Operating systems (Computers)
Classification :
TK5105
.
B995
2004


80. The internet book :
Author: Douglas E. Comer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internet.,World Wide Web.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet.,World Wide Web.
Classification :
TK5105
.
875
.
I57
I58
2019

