لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Nasrollah Pakniat
نتایج 1 تا 10 از مجموع 19
1
2
Conference Paper
یک طرح غیر تعاملی و وارسی پذیر عمومی برای بازیابی قانونی کلید
Authors:
احسان جهانگیری
،
جواد مهاجری
Year 1385
Publish place:
12th Annual Conference of Computer Society of Iran
Pages:
9
| Language: Persian
View And Download
Journal Paper
Visual cryptography scheme on graphs with $m^{*}(G)=۴$
Authors:
Mahmood Davarzani
Year 1398
Publish place:
Transactions on Combinatorics Issue 2، Vol 8
Pages:
14
| Language: English
View And Download
Journal Paper
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
Authors:
Nasrollah Pakniat
،
Ziba Eslami
Year 1396
Publish place:
Journal of Computing and Security Issue 1، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
Sharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode
Authors:
- -
Year 1393
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 5
Pages:
7
| Language: English
View And Download
Journal Paper
Security Analysis of a Hash-Based Secret Sharing Scheme
Authors:
Majid Farhadi
،
Hamideh Baypoor
،
Reza Mortazavi
Year 1395
Publish place:
Global Analysis And Discrete Mathematics Issue 2، Vol 1
Pages:
8
| Language: English
View And Download
Conference Paper
Secret Image Sharing with High Quality Stego Images
Authors:
Ziba Eslami,
،
Jamal Zarepour Ahmadabadi
Year 1388
Publish place:
6th Iranian Security Community Conference
Pages:
6
| Language: English
View And Download
Journal Paper
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Authors:
Mohammad Ali Hadavi
،
Rasool Jalili
،
Javad Ghareh Chamani
Year 1394
Publish place:
Journal of Computing and Security Issue 2، Vol 2
Pages:
21
| Language: English
View And Download
Journal Paper
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves
Authors:
Amir Alaei
،
Mohammad Hesam Tadayon
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 7
Pages:
8
| Language: English
View And Download
Journal Paper
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Authors:
H. Bypour
،
M. Farhadi
،
R. Mortazavi
Year 1398
Publish place:
International Journal of Engineering (IJE) Issue 8، Vol 32
Pages:
9
| Language: English
View And Download
Journal Paper
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes
Authors:
saeideh Kabirirad
،
Sorour Sheidani
،
Ziba Eslami
Year 1402
Publish place:
Computer and Knowledge Engineering Issue 2، Vol 6
Pages:
10
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 19
1
2