لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
poriya daliry
Omid Davarzani
Hossein gharaee
نتایج 1 تا 10 از مجموع 20
1
2
Journal Paper
Room Security System with Face Recognition using Local Binary Pattern Histogram Algorithm based on the Internet of Things
Authors:
Turkhamun Adi Kurniawan
،
Istiqomah Sumadikarta
،
Sukarno Bahat Nauli
،
Faizal Zuli
،
Teguh Budi Santoso
،
Muhammad Roufiqi Desma
Year 1402
Publish place:
majlesi Journal of Electrical Engineering Issue 2، Vol 17
Pages:
5
| Language: English
View And Download
Journal Paper
A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Authors:
A. Zaghian
،
M. J. Hashemi
Year 1390
Publish place:
International Journal of Mathematical Modelling and Computations Issue 4، Vol 1
Pages:
6
| Language: English
View And Download
Conference Paper
Security evaluation of MQTT protocol
Authors:
Omid Davarzani
،
Poriya Daliry
Year 1401
Publish place:
5th National Conference on New Technologies in Electrical and Computer Engineering
Pages:
5
| Language: English
View And Download
Conference Paper
Security issues over Software-Defined Networks (SDN)
Authors:
Soodeh Asgari
Year 1400
Publish place:
Sixth International Conference on Electrical Engineering, Computer Science and Information Technology
Pages:
5
| Language: English
View And Download
Journal Paper
A modified continuous lightweight authentication to increase the information security on internet of Things
Authors:
Rahim Asghari
Year 1400
Publish place:
Computational Sciences and Engineering Issue 2، Vol 1
Pages:
14
| Language: English
View And Download
Conference Paper
Investigation of combined intrusion ate detection systems with network security approach Case study of RPL protocols
Authors:
Sadaf Taghipoor Tabrizi
Year 1400
Publish place:
Twelfth International Conference on Information Technology, Computer and Telecommunications
Pages:
6
| Language: English
View And Download
Journal Paper
Biometric Based User Authentication Protocol in Smart Homes
Authors:
Hossein Gharaee
،
Fateme Shabani
،
Naser Mohammadzadeh
،
Shayan Mehranpoor
Year 1399
Publish place:
International Journal of Web Research Issue 1، Vol 3
Pages:
13
| Language: English
View And Download
Conference Paper
Increasing Electronic Commerce Security by using an Advanced Method for Botnets Detection
Authors:
Javad Amini
،
Hamid Ebrahimi Yeganeh
Year 1397
Publish place:
Fourth National Conference on Applied Research in Electrical Engineering, Mechanics, Computer and Information Technology
Pages:
14
| Language: English
View And Download
Conference Paper
یک پروتکل احراز هویت رادیوشناسه پیشنهادی با استفاده از دست تکانی سه مرحله ای
Authors:
الهام صمدی
،
امیرمسعود بیدگلی
،
زهره مافی
Year 1396
Publish place:
10th Concference of on Recent Research in Science and Technology
Pages:
12
| Language: Persian
View And Download
Conference Paper
Ecommerce security
Authors:
Fatemeh Amanian
Year 1396
Publish place:
5th International Conference on knowledge based research in Computer engineering and Information Technology
Pages:
13
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 20
1
2