• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹ پاسخ غیر تکراری از ۹ پاسخ تکراری در مدت زمان ۰,۵۷ ثانیه یافت شد.

1. Bitcoin, Blockchain Technology, and Secure Hash Algorithms

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Plummer, Daniel Eugene

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science,Electrical engineering,Mathematics

Classification :

2. Financial cryptography and data security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andrew A. Adams, Michael Brenner, Matthew Smith (eds).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security -- Congresses.,Sécurité informatique -- Congrès.,User-centered system design -- Congresses.

Classification :
QA76
.
9
.
A25
A537
2013

3. Introduction to Cryptography

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Johannes A. Buchmann.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data structures (Computer science).,Mathematics.,Number theory.

Classification :

4. Network and System Security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Javier Lopez, Xinyi Huang, Ravi Sandhu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer Communication Networks.,Computer science.,Data protection.

Classification :

5. Passwords :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Brian Lennon.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Electronic surveillance.,Philology.,54.62 machine readable data.,54.62 machine readable data.,Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Digital Humanities,Electronic surveillance.,Kryptologie,Passwort,Philologie,Philology.,Textverarbeitung

Classification :
QA76
.
9
.
A25
L485
2018

6. Seeking the truth from mobile evidence :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: John Bair.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation.,Electronic evidence.,Electronics in criminal investigation.,Forensic sciences-- Data processing.,Forensic sciences.,Mobile communication systems.,Mobile device forensics.,BUSINESS & ECONOMICS-- Infrastructure.,Computer crimes-- Investigation.,Electronic evidence.,Electronics in criminal investigation.,Forensic sciences-- Data processing.,Forensic sciences.,Mobile communication systems.,Mobile device forensics.,SOCIAL SCIENCE-- General.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.

Classification :
TK5103
.
4837
.
B35
2018

7. Smart Card Application Development Using Java

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Uwe Hansmann, Martin S. Nicklous, Thomas Schäck, Achim Schneider, Frank Seliger.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science.,Data encryption (Computer science),Data transmission systems.

Classification :
QA76
.
73
.
J38
B989
2002

8. The design of Rijndael: AES--the Advanced Encryption Standard

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Daemen, Joan

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Passwords ، Computer security,، Data encryption )Computer science(

Classification :
QA
76
.
9
.
A25
D32

9. The design of Rijndael : AES--the Advanced Encryption Standard

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Daemen, Joan

Library: Central Library of Esfehan University of Technology (Esfahan)

Subject: Computer security -- Passwords ► Data encryption (Computer science)

Classification :
76
.
9
.
A25
D32
2002
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival