1. Bitcoin, Blockchain Technology, and Secure Hash Algorithms
Author: Plummer, Daniel Eugene
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Electrical engineering,Mathematics

2. Financial cryptography and data security :
Author: Andrew A. Adams, Michael Brenner, Matthew Smith (eds).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Congresses.,Sécurité informatique -- Congrès.,User-centered system design -- Congresses.
Classification :
QA76
.
9
.
A25
A537
2013


3. Introduction to Cryptography
Author: by Johannes A. Buchmann.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data structures (Computer science).,Mathematics.,Number theory.

4. Network and System Security :
Author: edited by Javier Lopez, Xinyi Huang, Ravi Sandhu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data protection.

5. Passwords :
Author: Brian Lennon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Electronic surveillance.,Philology.,54.62 machine readable data.,54.62 machine readable data.,Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Digital Humanities,Electronic surveillance.,Kryptologie,Passwort,Philologie,Philology.,Textverarbeitung
Classification :
QA76
.
9
.
A25
L485
2018


6. Seeking the truth from mobile evidence :
Author: John Bair.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Electronic evidence.,Electronics in criminal investigation.,Forensic sciences-- Data processing.,Forensic sciences.,Mobile communication systems.,Mobile device forensics.,BUSINESS & ECONOMICS-- Infrastructure.,Computer crimes-- Investigation.,Electronic evidence.,Electronics in criminal investigation.,Forensic sciences-- Data processing.,Forensic sciences.,Mobile communication systems.,Mobile device forensics.,SOCIAL SCIENCE-- General.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.
Classification :
TK5103
.
4837
.
B35
2018


7. Smart Card Application Development Using Java
Author: by Uwe Hansmann, Martin S. Nicklous, Thomas Schäck, Achim Schneider, Frank Seliger.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data transmission systems.
Classification :
QA76
.
73
.
J38
B989
2002


8. The design of Rijndael: AES--the Advanced Encryption Standard
Author: Daemen, Joan
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Passwords ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
D32


9. The design of Rijndael : AES--the Advanced Encryption Standard
Author: Daemen, Joan
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security -- Passwords ► Data encryption (Computer science)
Classification :
76
.
9
.
A25
D32
2002
