ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

کتاب های Eds.

کتاب های نویسنده
صفحه ۱۶۵ از ۱,۵۵۸ در بین ۳۸,۹۳۱ کتاب.
    DJVU
    Advances in Cryptology — EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings

    Advances in Cryptology — EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings

    Victor Shoup, Rosario Gennaro (auth.), Kaisa Nyberg (eds.), 1998
    DJVU
    Advances in Cryptology — EUROCRYPT’ 85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques Linz, Austria, April 1985

    Advances in Cryptology — EUROCRYPT’ 85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques Linz, Austria, April 1985

    Otto J. Horak (auth.), Franz Pichler (eds.), 1986
    DJVU
    Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings

    Advances in Cryptology — EUROCRYPT’ 87: Workshop on the Theory and Application of Cryptographic Techniques Amsterdam, The Netherlands, April 13–15, 1987 Proceedings

    James L. Massey (auth.), David Chaum, Wyn L. Price (eds.), 1988
    DJVU
    Advances in Cryptology — EUROCRYPT’ 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

    Advances in Cryptology — EUROCRYPT’ 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24–28, 1992 Proceedings

    C. Blundo, A. De Santis, D. R. Stinson, U. Vaccaro (auth.), Rainer A. Rueppel (eds.), 1993
    DJVU
    Advances in Cryptology-CRYPT0’ 90: Proceedings

    Advances in Cryptology-CRYPT0’ 90: Proceedings

    Eli Biham, Adi Shamir (auth.), Alfred J. Menezes, Scott A. Vanstone (eds.), 1991
    DJVU
    Advances in Cryptology: Proceedings of CRYPTO 84

    Advances in Cryptology: Proceedings of CRYPTO 84

    S C Serpell, C B Brookson, B L Clark (auth.), George Robert Blakley, David Chaum (eds.), 1985
    PDF
    Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers

    Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers

    Jean-Jacques Quisquater (auth.), Burton S. Kaliski, çetin K. Koç, Christof Paar (eds.), 2003
    PDF
    Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings

    Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings

    Frank Stajano (auth.), Colin D. Walter, Çetin K. Koç, Christof Paar (eds.), 2003
    PDF
    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
    DJVU
    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
    PDF
    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings

    Jason Waddle, David Wagner (auth.), Marc Joye, Jean-Jacques Quisquater (eds.), 2004
    PDF
    Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings

    Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings

    C. Archambeau, E. Peeters, F. -X. Standaert, J. -J. Quisquater (auth.), Louis Goubin, Mitsuru Matsui (eds.), 2006
    PDF
    Cryptographic Hardware and Embedded Systems – CHES 2005: 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

    Cryptographic Hardware and Embedded Systems – CHES 2005: 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings

    William Dupuy, Sébastien Kunz-Jacques (auth.), Josyula R. Rao, Berk Sunar (eds.), 2005
    PDF
    Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings

    Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings

    Ueli Maurer (auth.), Nigel P. Smart (eds.), 2005
    PDF
    Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings

    Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings

    Jonathan Katz (auth.), Steven D. Galbraith (eds.), 2007
    PDF
    Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings

    Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings

    Kenneth G. Paterson (auth.), Michael Walker (eds.), 1999
    PDF
    Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    Cryptography and Coding: 8th IMA International Conference Cirencester, UK, December 17–19, 2001 Proceedings

    A. Al Jabri (auth.), Bahram Honary (eds.), 2001
    PDF
    Cryptography and Coding: 9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings

    Cryptography and Coding: 9th IMA International Conference, Cirencester, UK, December 16-18, 2003. Proceedings

    Patrick Guy Farrell (auth.), Kenneth G. Paterson (eds.), 2003
    PDF
    Cryptography and Lattices: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2001 Revised Papers

    Cryptography and Lattices: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2001 Revised Papers

    Miklós Ajtai, Ravi Kumar, Dandapani Sivakumar (auth.), Joseph H. Silverman (eds.), 2001
    PDF
    Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings

    Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings

    Shay Gueron, Jean-Pierre Seifert (auth.), Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert (eds.), 2006
    PDF
    Grobner bases, coding, and cryptography

    Grobner bases, coding, and cryptography

    Massimiliano Sala (auth.), Massimiliano Sala, Shojiro Sakata, Teo Mora, Carlo Traverso, Ludovic Perret (eds.), 2009
    PDF
    Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings

    Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings

    Willi Geiselmann, Rainer Steinwandt (auth.), Kil-Hyun Nam, Gwangsoo Rhee (eds.), 2007
    PDF
    Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

    Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

    Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai (auth.), Pil Joong Lee, Jung Hee Cheon (eds.), 2009
    PDF
    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

    Serge Vaudenay (auth.), Dengguo Feng, Dongdai Lin, Moti Yung (eds.), 2005
    PDF
    Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

    Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

    Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern (auth.), Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.), 2008
    |< ۱۶۰ ۱۶۱ ۱۶۲ ۱۶۳ ۱۶۴ ۱۶۵ ۱۶۶ ۱۶۷ ۱۶۸ ۱۶۹ ۱۷۰ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.