لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Nasrollah Pakniat
نتایج 1 تا 10 از مجموع 19
1
2
Journal Paper
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes
Authors:
saeideh Kabirirad
،
Sorour Sheidani
،
Ziba Eslami
Year 1402
Publish place:
Computer and Knowledge Engineering Issue 2، Vol 6
Pages:
10
| Language: English
View And Download
Journal Paper
Security Analysis of a Hash-Based Secret Sharing Scheme
Authors:
Majid Farhadi
،
Hamideh Baypoor
،
Reza Mortazavi
Year 1395
Publish place:
Global Analysis And Discrete Mathematics Issue 2، Vol 1
Pages:
8
| Language: English
View And Download
Conference Paper
A cognitive study on a model based on deep learning and cryptography for maintaining privacy in the cloud
Authors:
Arezoo Rastkar Janagard
Year 1402
Publish place:
The 19th International Conference on Information Technology, Computers and Telecommunications
Pages:
10
| Language: English
View And Download
Journal Paper
A New Scheme for Lossless Meaningful Visual Secret Sharing by using XOR Properties
Authors:
A.M. Latif
،
Z. Mehrnahad
،
J. Zarepour
Year 1402
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 2، Vol 11
Pages:
18
| Language: English
View And Download
Journal Paper
Sharing several secrets based on Lagrange's interpolation formula and Cipher feedback mode
Authors:
- -
Year 1393
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 5
Pages:
7
| Language: English
View And Download
Journal Paper
A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
Authors:
Ali Saeidi Rashkolia
،
Mohammad Mahdi Zahedi
،
Masoud Hadian Dehkordi
Year 1397
Publish place:
Iranian Journal of Fuzzy Systems Issue 4، Vol 15
Pages:
11
| Language: English
View And Download
Journal Paper
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves
Authors:
Amir Alaei
،
Mohammad Hesam Tadayon
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 7
Pages:
8
| Language: English
View And Download
Journal Paper
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Authors:
Mohammad Ali Hadavi
،
Rasool Jalili
،
Javad Ghareh Chamani
Year 1394
Publish place:
Journal of Computing and Security Issue 2، Vol 2
Pages:
21
| Language: English
View And Download
Journal Paper
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
Authors:
Nasrollah Pakniat
،
Ziba Eslami
Year 1396
Publish place:
Journal of Computing and Security Issue 1، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
A Study on Multisecret-Sharing Schemes Based on Linear Codes
Authors:
Selda Çalkavur
Year 1399
Publish place:
Italian Journal of Science & Engineering Issue 4، Vol 4
Pages:
9
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 19
1
2