لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
AliMohammad Latif
Abolfazl Omidi
نتایج 1 تا 10 از مجموع 104
1
2
3
4
...
Last
Conference Paper
Study of Cryptography in Cloud Computing
Authors:
Asif Hujilin
،
Aklipar Husainpilo
Year 1402
Publish place:
The first international conference on engineering and information technology
Pages:
11
| Language: English
View And Download
Journal Paper
Comparison of two Public Key Cryptosystems
Authors:
mahnaz mohammadi
،
alireza zolghadr
،
mohammad pourmina
Year 1397
Publish place:
Journal of Optoelectronical Nanostructures Issue 3، Vol 3
Pages:
12
| Language: English
View And Download
Journal Paper
Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges
Authors:
Yashar Salami
،
Vahid Khajevand
،
Esmaeil Zeinali
Year 1402
Publish place:
Journal of Computer and Robotics Issue 2، Vol 16
Pages:
53
| Language: English
View And Download
Journal Paper
High-quality Visual Cryptography of Real-value Images without Pixel Expansion using Fuzzy Random Grids
Authors:
Mostafa Mokhtari Ardakan
،
Reza Ramezani
،
Ali Mohammad Latif
Year 1402
Publish place:
Iranian Journal of Fuzzy Systems Issue 6، Vol 20
Pages:
27
| Language: English
View And Download
Journal Paper
Cryptography using multinacci block matrices
Authors:
Munesh Kumari
،
Jagmohan Tanti
Year 1402
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 10، Vol 14
Pages:
9
| Language: English
View And Download
Journal Paper
Proposing a Secure Architecture for Mobile-Learning Environments and Investigating Teachers’ Attitude
Authors:
Seyed Hassan Sadeghzadeh
،
Ali Nakhaei
Year 1396
Publish place:
Interdisciplinary Journal of Virtual Learning in Medical Sciences Issue 3، Vol 8
Pages:
8
| Language: English
View And Download
Journal Paper
A New S-Box Design by Applying Bat Algorithm Based Technique
Authors:
Din
،
K. Pal
،
Muttoo
،
Madan
Year 1402
Publish place:
Journal of Information Technology Management Issue 3، Vol 15
Pages:
14
| Language: English
View And Download
Conference Paper
Machine Learning Techniques for IoT Security
Authors:
Abolfazl Omidi
Year 1402
Publish place:
The 6th International Conference on Management, Tourism and Technology
Pages:
11
| Language: English
View And Download
Journal Paper
Efficient NTT Multiplier of NTRU Prime PQC Algorithm
Authors:
Raziyeh Salarifard
،
Reza Rashidian
،
Reyhaneh Kharazmi
،
Ali Jahanian
Year 1402
Publish place:
Journal of Innovations in Computer Science and Engineering Issue 1، Vol 1
Pages:
7
| Language: English
View And Download
Conference Paper
Security Considerations in the Internet of Vehicles (IoV): Challenges of Designing Authentication Schemes for IoV
Authors:
Parvin Rastegari
Year 1401
Publish place:
The 19th International Conference on Traffic and Transportation Engineering
Pages:
11
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 104
1
2
3
4
...
Last