1. Public key cryptography
Author: / David Naccache, Pascal Paillier (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computers -- Access control,Data encryption (Computer science),Public key cryptography
Classification :
QA
76
.
9
.
A25
I567
2002


2. Public key cryptography, PKC 2006: 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I5555
2006


3. Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002; proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers-- Access control,Congresses ، Data encryption )Computer science(,Congresses ، Public key cryptography
Classification :
QA
76
.
9
.
A25
.
I567
2002


4. Security for wireless sensor networks using identity-based cryptography /
Author: Harsh Kupwade Patil, Stephen A. Szygenda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers-- Access control.,Data encryption (Computer science),Public key cryptography.
