1. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


2. Authentication systems for secure networks
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


3. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34


4. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007


5. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks- Security measures ► Cryptography
Classification :
005
F727c


6. Cryptography and network security
Author: Behrouz A. Forouzan
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK
,
5105
.
59
,.
F672
,
2008


7. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks- Security measures ► Cryptography
Classification :
005
F727c


8. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672


9. Cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks, Security measures,Cryptography
Classification :
TK5105
.
59
.
F67C7
2008


10. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672
2008


11. Cryptography and network security
Author: / by William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Data encryption (Computer science),Public key cryptography
Classification :
TK5105
.
59
.
S713
2008


12. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


13. Cryptology and network security
Author: / Feng Bao ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5538
,
2007


14. Cryptology and network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Cryptography ; Congresses. ; Authentifikation. ; swd. ; Computersicherheit. ; swd. ; Datensicherung. ; swd. ; Kryptoanalyse. ; swd. ; Kryptosystem. ; swd. ; Passwort. ; swd. ; Privatsph?re. ; swd. ; Re

15. Cryptology and network security :6th international conference, CANS 2007 Singapore, December 8-10 2007 : proceedings
Author: ]edited by[ Feng Bao, San Ling, Tatsuaki Okamoto
Library: Library of Niroo Research Institue (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25I5538
2007


16. Disappearing cryptograph
Author: / Peter Wayner
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Cryptography.,Internet.
Classification :
TK
,
5105
.
59
,.
W39
,
2009


17. Disappearing cryptography
Author: Peter Wayner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cryptography,Internet
Classification :
TK5105
.
59
.
W39
2009


18. Disappearing cryptography : information hiding :steganography & watermarking
Author: Wayner, Peter, 1964-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks-Security measures ► Cryptography ► Internet ► Digital watermarking
Classification :
005
W985d


19. Disappearing cryptography: information hiding: steganography & watermarking
Author: Wayner, Peter
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography,، Internet
Classification :
TK
5105
.
59
.
W39
2002


20. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007

