لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Morteza Analoui
Abbas Sheikhtaheri
poriya daliry
نتایج 11 تا 20 از مجموع 66
1
2
3
4
5
...
Last
Journal Paper
Lightweight Additive Homomorphic Schemes for Cloud Outsourcing Scenarios
Authors:
Somayeh Sobati.M
Year 1398
Publish place:
Iranian Journal of Distributed Computing Systems Issue 2، Vol 2
Pages:
8
| Language: English
View And Download
Conference Paper
Data Security In Cloud Computing
Authors:
Poriya Daliry
،
Mustafa Alizada
،
Ahamad Zaki Karimi
،
Azizullah Bazali
Year 1400
Publish place:
6th International Conference on Applied Research in Computer, Electrical and Information Technology
Pages:
7
| Language: English
View And Download
Journal Paper
Multi-Objective Response to Co-Resident Attacks in Cloud Environment
Authors:
Farzaneh Abazari
،
Morteza Analoui
،
Hassan Takabi
Year 1396
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 9
Pages:
12
| Language: English
View And Download
Journal Paper
Proposing a New Algorithm for Predicting Short-Term and Long-Term Trust-ability in Cloud Computing
Authors:
Samiyeh Khosravi
Year 1398
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 2، Vol 11
Pages:
8
| Language: English
View And Download
Journal Paper
مقایسه الگوریتم های بیمار محور برای امنیت اطلاعات سلامت در شبکه های اجتماعی سلامت و محیط ابر
Authors:
مهین محمدی
،
عباس شیخ طاهری
،
فرزانه کرمانی
Year 1398
Publish place:
Journal of Modern Medical Information Science Issue 2، Vol 5
Pages:
11
| Language: Persian
View And Download
Conference Paper
Comparison of Various Encryption Algorithms for Data Security in the Cloud Computing
Authors:
Seyedeh Maryam Shahrokhi
Year 1398
Publish place:
Third International Congress of Science and Engineering
Pages:
7
| Language: English
View And Download
Conference Paper
Present a hybrid and symmetric encryption strategy for proving security and increasing performance in cloud data centers
Authors:
Seyedeh Foruzan Shetab Bushehri
،
Mohsen Kajbaf
،
Khaled Mohammadnejad
Year 1398
Publish place:
International Conference on Information Technology, Computer and Telecommunications
Pages:
15
| Language: English
View And Download
Conference Paper
Developing an Efficient Method of Multi-Factor Authentication in the Software Layer as a Cloud Computing Environment Service
Authors:
Zahra Jatan
،
Alireza Hedayati
،
Vahe Aghazarian
Year 1398
Publish place:
International Conference on Science, Engineering, Technology and Technology Businesses
Pages:
13
| Language: English
View And Download
Conference Paper
Top four Data Security and Privacy Concerns in Cloud Computing and Related Solving Solutions
Authors:
Elham Khezrafar Enayati
Year 1397
Publish place:
International Conference on New Horizons in Engineering Sciences
Pages:
14
| Language: English
View And Download
Conference Paper
Blockchain in cloud computing and security challenges
Authors:
Saeed Fadaei
،
Fatemeh Amiri
Year 1397
Publish place:
Third National Conference on Computer Engineering, Information Technology and Data Processing
Pages:
10
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 66
1
2
3
4
5
...
Last