لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Asadollah Shahbahrami
نتایج 51 تا 60 از مجموع 119
First
...
3
4
5
6
7
8
9
...
Last
Journal Paper
Image authentication using LBP-based perceptual image hashing
Authors:
R. Davarzani
،
S. Mozaffari
،
Kh. Yaghmaie
Year 1394
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 1، Vol 3
Pages:
10
| Language: English
View And Download
Journal Paper
Compressed Image Hashing using Minimum Magnitude CSLBP
Authors:
V. Patil
،
T. Sarode
Year 1398
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 2، Vol 7
Pages:
11
| Language: English
View And Download
Journal Paper
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Authors:
Olayemi Olaniyi
،
Ameh Ameh
،
Lukman Ajao
،
Omolara Lawal
Year 1398
Publish place:
Journal of Advances in Computer Engineering and Technology Issue 2، Vol 5
Pages:
10
| Language: English
View And Download
Conference Paper
Attribute based access control in Internet of Things with machine learning approach and AES authentication
Authors:
Mina Maktabdaran
،
M. Hassan Shirali-Shahreza
Year 1398
Publish place:
?th International Conference on Natural Sciences (ICNS????)-Mathematics & Computer
Pages:
8
| Language: English
View And Download
Conference Paper
مروری بر احراز هویت در اینترنت اشیاء
Authors:
فرهنگ پدیداران مقدم
،
بهروز ارجمندزاده
Year 1397
Publish place:
Conference on Knowledge and Technology mechanical and electrical engineering iran
Pages:
24
| Language: Persian
View And Download
Conference Paper
Blockchain in cloud computing and security challenges
Authors:
Saeed Fadaei
،
Fatemeh Amiri
Year 1397
Publish place:
Third National Conference on Computer Engineering, Information Technology and Data Processing
Pages:
10
| Language: English
View And Download
Conference Paper
Provide a solution for the allocation of Customers authentication methods (Case study: multimedia contact center, Agriculture Bank of Iran)
Authors:
Mohsen Ebadi Jokandan
،
Asadollah Shahbahrami
Year 1392
Publish place:
Third National Conference on Electronic Banking and Payment Systems
Pages:
16
| Language: English
View And Download
Conference Paper
Identification and authentication challenges of medicinal plants in Iran
Authors:
Mohammad Sadegh Amiri
،
Mohammad Reza Joharchi
،
Mohabat Nadaf
Year 1396
Publish place:
Pages:
6
| Language: English
View And Download
Conference Paper
Individual Verification based on Difference Parametric Features Extracted from P and QRS waves of ECG Signal
Authors:
Nahaleh Hassanzadeh
،
Saeid Rashidi
Year 1395
Publish place:
Conference on New Research in Science and Engineering
Pages:
9
| Language: English
View And Download
Conference Paper
Formal security and privacy analysis and improvements of RFID hash-based authentication protocol
Authors:
Arezoo Rezaei
،
Mahdi R. Alagheband
Year 1396
Publish place:
Fifth International Conference on Electrical and Computer Engineering with Emphasis on Indigenous Knowledge
Pages:
11
| Language: English
View And Download
نتایج 51 تا 60 از مجموع 119
First
...
3
4
5
6
7
8
9
...
Last