لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 161
1
2
3
4
...
Last
Journal Paper
Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice
Authors:
Sedigheh Khajouei-Nejad
،
Hamid Haj Seyyed Javadi
،
Sam Jabbehdari
،
Seyed Mohammad Hossein Moattar
Year 1402
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 1، Vol 16
Pages:
8
| Language: English
View And Download
Journal Paper
An Image Cryptosystem based on Elementary Cellular Automata with Integrity Checking
Authors:
منا کردستانی
Year 1402
Publish place:
Journal of Intelligent Knowledge Exploration and Processing Issue 11، Vol 3
Pages:
18
| Language: Persian
View And Download
Journal Paper
An Adaptive Image Encryption Scheme Guided by Fuzzy Models
Authors:
Mahdi Shariatzadeh
،
Mohammad Javad Rostami
،
Mahdi Eftekhari
،
Saeed Saryazdi
Year 1403
Publish place:
Iranian Journal of Fuzzy Systems Issue 1، Vol 21
Pages:
18
| Language: English
View And Download
Journal Paper
A Fuzzy Optimal Lightweight Convolutional Neural Network for Deduplication Detection in Cloud Server
Authors:
Periasamy JK
،
Selvam L
،
Anuradha M
،
R Kennady
Year 1403
Publish place:
Iranian Journal of Fuzzy Systems Issue 1، Vol 21
Pages:
17
| Language: English
View And Download
Conference Paper
Study of Cryptography in Cloud Computing
Authors:
Asif Hujilin
،
Aklipar Husainpilo
Year 1402
Publish place:
The first international conference on engineering and information technology
Pages:
11
| Language: English
View And Download
Journal Paper
A New Image Encryption Algorithm Using a Hyperchaotic Lorenz System to Produce Efficient and Sufficiently Swift Responses to Different Security Needs of Clients
Authors:
Zahra Kaviyani
،
Mahnaz Mohammadi
،
abbas kamaly
Year 1402
Publish place:
Journal of Optoelectronical Nanostructures Issue 3، Vol 8
Pages:
18
| Language: English
View And Download
Journal Paper
A Fault-Resistant Architecture for AES S-box Architecture
Authors:
Mahdi Taheri
،
Saeideh Sheikhpour
،
Mohammad Saeed Ansari
،
Ali Mahani
Year 1401
Publish place:
Journal of Applied Research in Electrical Engineering Issue 1، Vol 1
Pages:
7
| Language: English
View And Download
Journal Paper
Using Blockchain to Improve the Security Of The X۳DH Key Exchange Protocol
Authors:
Sayed Javad Mousavi
،
Kamal Chaharsooghi
،
Gholam Ali Montazer
Year 1402
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 15
Pages:
10
| Language: English
View And Download
Journal Paper
Novel Scheme for Data Hiding in Binary Images using Cover Pattern Histogram
Authors:
G. Chhajed
،
B. Garg
Year 1402
Publish place:
International Journal of Engineering (IJE) Issue 11، Vol 36
Pages:
13
| Language: English
View And Download
Journal Paper
Photonic and Plasmonic Encryption Based on Reflection–Transmission Reconfigurable Digital Coding Metasurface in Holographic images
Authors:
Ali Farmani
،
Hadis Fouladi
Year 1402
Publish place:
Journal of Holography Applications in Physics Issue 3، Vol 3
Pages:
19
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 161
1
2
3
4
...
Last