81. Applied public key infrastructure :
Author: edited by Jianying Zhou [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Public key cryptography, Congresses.,Public key infrastructure (Computer security), Congresses.,COMPUTERS-- Security-- Cryptography.,Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
I558
2005eb


82. Applied public key infrastructure
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: key cryptography ; Congresses. ; -Public key infrastructure (Computer security) ; Congresses. ; Public

83. Applied quantum cryptography
Author:
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Photon detectors,Quantum cryptography,Computer security,Quantum theory
Classification :
005
.
82
A652


84. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


85. Authentication systems for secure networks
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


86. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
005
.
8
H781B
2005


87. Beginning cryptography with Java
Author: Hook, David, 1962-
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Cryptography ► Public key infrastructure (Computer security) ► Java (Computer program language)
Classification :
76
.
9
.
A25
H645

88. Beginning cryptography with Java
Author: / David Hook
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Public key infrastructure (Computer security),Java (Computer program language)
Classification :
QA76
.
9
.
A25
,
H645
2005


89. Boolean functions in cryptology and information security
Author: / edited by Bart Preneel and Oleg A. Logachev
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses
Classification :
E-BOOK

90. Broadband quantum cryptography
Author: / Daniel J. Rogers
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Cryptography,Broadband communication systems -- Security measures,Quantum communication
Classification :
QA
76
.
9
.
A25
R64
2010


91. Broadband quantum cryptography /
Author: Daniel J. Rogers
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Broadband communication systems-- Security measures,Cryptography,Data encryption (Computer science),Quantum communication
Classification :
QA76
.
9
.
A25
R64
2010


92. Building in big brother :
Author: edited by Lance J. Hoffman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25
B85
1995


93. CHES 2010--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ; Cryptographie ; Congr?s. ; ram. ; Syst?mes enfouis (informatique) ; Congr?s. ; ram. ; Chiffrement (informatique) ; Congr?s. ; ram. ; Eingebettetes Sys

94. CHES 2002 :--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses ; Cryptography ; Congresses ; Computer security ; Congresses ;

95. CHES 2005--Cryptographic hardware and embedded systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems ; Congresses. ; Cryptography ; Congresses. ; Computer security ; Congresses. ;

96. CRYPTO 2006-Advances in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ;

97. Chaos-based cryptography :
Author: Ljupco Kocarev and Shiguo Lian (Eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Artificial Intelligence (incl. Robotics),Computational Intelligence,Data Encryption,Data Structures, Cryptology and Information Theory
Classification :
QA76
.
9
.
A25
C427
2011eb


98. Chaos-based cryptography :theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev, Shiguo Lian
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C427


99. Chaos-based cryptography : theory, algorithms and applications
Author: Ljupco Kocarev, Shiguo Lian )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Cryptography,، Chaotic behavior in systems,، Computer security
Classification :
Z
103
.
C42


100. Chaos-based cryptography: theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev and Shiguo Lian
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C4
2011

