لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Seyed Mohammad Alavi
Mohammadreza Eslaminejad
نتایج 11 تا 20 از مجموع 20
1
2
Conference Paper
Investigating NFC technology from the perspective of security, analysis of attacks and existing risk
Authors:
S. Mahdi Shariati
،
a Abouzarjomehri
،
M. Hossein Ahmadzadegan
Year 1394
Publish place:
2nd Internatioanl Conference on Knowledge -Base Engineering and Innovation
Pages:
5
| Language: English
View And Download
Conference Paper
Increasing Electronic Commerce Security by using an Advanced Method for Botnets Detection
Authors:
Pedram Amini
،
Muhammad Amin Araghizadeh
،
Reza Azmi
Year 1394
Publish place:
2nd Internatioanl Conference on Knowledge -Base Engineering and Innovation
Pages:
7
| Language: English
View And Download
Conference Paper
Authentication and authorizing scheme based on umts aka protocol for cognitive radio networks
Authors:
Sharareh Vizvari
،
Reza Berangi
،
Khosro Nematollahi
Year 1394
Publish place:
2nd Internatioanl Conference on Knowledge -Base Engineering and Innovation
Pages:
7
| Language: English
View And Download
Journal Paper
Authentication and Authorizing Scheme Based on Umts Aka Protocol for Cognitive Radio Networks
Authors:
Sharareh Vizvari
،
Reza Berangi
،
Khosro Nematollahi
Year 1395
Publish place:
Journal of Knowledge-Based Engineering and Innovation Issue 5، Vol 2
Pages:
10
| Language: English
View And Download
Conference Paper
Investigating Energy Efficiency And Security For Routing In Heterogeneous Wireless Sensor Networks
Authors:
Mohammad Amin Sadeghi
،
Mohammad Reza Eslaminejad
Year 1394
Publish place:
First International Conference on Information Technology
Pages:
5
| Language: English
View And Download
Conference Paper
VANET Routing Protocols
Authors:
Seyed Hosein Shahrokhi
،
Vida Barekat Rezaei
Year 1394
Publish place:
National Conference on Information Technology, Computer & Communication
Pages:
9
| Language: English
View And Download
Journal Paper
A Strengthened Version of a Hash-based RFID Server-less Security Scheme
Authors:
Shahab Abdolmaleky
،
Shahla Atapoor
،
Mohammad Hajighasemlou
،
Hamid Sharini
Year 1394
Publish place:
Advances in Computer Science : an International Journal Issue 3، Vol 4
Pages:
6
| Language: English
View And Download
Journal Paper
Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
Authors:
Seyed Mohammad Alavi
،
Behzad Abdolmaleki
،
Karim Baghery
Year 1393
Publish place:
Advances in Computer Science : an International Journal Issue 6، Vol 3
Pages:
6
| Language: English
View And Download
Journal Paper
Security and Privacy Flaws in a Recent Authentication Protocolfor EPC C1 G2 RFID Tags
Authors:
Seyed Mohammad Alav
،
Karim Baghery
،
Behzad Abdolmalek
Year 1393
Publish place:
Advances in Computer Science : an International Journal Issue 5، Vol 3
Pages:
9
| Language: English
View And Download
Journal Paper
Botnet Detection using NetFlow and Clustering
Authors:
Pedram Amini
،
Reza Azmi
،
MuhammadAmin Araghizadeh
Year 1392
Publish place:
Advances in Computer Science : an International Journal Issue 2، Vol 3
Pages:
11
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 20
1
2