لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
نتایج 1 تا 10 از مجموع 50
1
2
3
4
Journal Paper
PSALR : Parallel Sequence Alignment for long Sequence Read with Hash Model
Authors:
Nasrin Aghaee-Maybodi
،
Amin Nezarat
،
Sima Emadi
،
Mohammad Reza Ghaffari
Year 1403
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 3، Vol 12
Pages:
21
| Language: English
View And Download
Conference Paper
Firmware Encryption and Obfuscation for IoT Security Exploring advanced encryption and obfuscation techniques to protect sensitive firmware code and prevent reverse engineering and code tampering
Authors:
Ehsan Narimani
،
Mohammad Janbozorgi
،
Reza Minaei
Year 1403
Publish place:
1st international conference on information technology, management and computer
Pages:
8
| Language: English
View And Download
Conference Paper
Blockchain Technology Architecture, Security and Its Impact on Digital Currency Transactions
Authors:
Kamran Rahimi
،
Soheila Estaji
Year 1403
Publish place:
18th International Conference on Innovation and Research in Engineering Sciences
Pages:
7
| Language: English
View And Download
Conference Paper
متاورس و بلاک چین
Authors:
محمدامیر جدیدی
،
امید محمودی
،
میثم منصوری
Year 1403
Publish place:
The 7th National Conference on New Technologies in Electrical, Computer and Mechanical Engineering of Iran
Pages:
11
| Language: Persian
View And Download
Journal Paper
Covering perfect hash families and covering arrays of higher index
Authors:
Charles Colbourn
Year 1403
Publish place:
International Journal of Group Theory Issue 3، Vol 13
Pages:
13
| Language: English
View And Download
Conference Paper
متاورس و بلاک چین
Authors:
فاطره ناظری
،
احسان شهاب
Year 1402
Publish place:
5th National Conference and 2nd International Conference on New Patterns of Business Management in Unstable Conditions
Pages:
8
| Language: Persian
View And Download
Journal Paper
Brand New Categories of Cryptographic Hash Functions: A Survey
Authors:
B. Sefid-Dashti
،
J. Salimi Sartakhti
،
H. Daghigh
Year 1402
Publish place:
Journal of Electrical and Computer Engineering Innovations Issue 2، Vol 11
Pages:
20
| Language: English
View And Download
Conference Paper
ASIC Implementation of Chained Cryptographic Hash functions
Authors:
Hayder Hassan Ibrahim Al-TAMEEMI
،
Atefeh Salimi
Year 1401
Publish place:
7th National Conference on New Idea on Electrical Engineering
Pages:
5
| Language: English
View And Download
Conference Paper
بررسی الگوریتم چکیده ساز JH در محیط سیمولاتور و سنتس آن
Authors:
ابراهیم سلیمان هومر
،
مهدی جوانمردی
Year 1401
Publish place:
The 8th International Conference on Electrical,computer and mechanical engineering
Pages:
12
| Language: Persian
View And Download
Conference Paper
بررسی الگوهای بهینه کدنگاری مقاوم به منظور اجرا روی مدار مجتمع دیجیتال برنامه پذیر
Authors:
ابراهیم سلیمان هومر
،
مهدی جوانمرد
Year 1401
Publish place:
2nd International Conference on Electrical, Computer and Mechanical Engineering
Pages:
19
| Language: Persian
View And Download
نتایج 1 تا 10 از مجموع 50
1
2
3
4