لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Seyed Amin Hosseini Seno
نتایج 81 تا 90 از مجموع 120
First
...
6
7
8
9
10
11
12
Journal Paper
Authentication and Authorizing Scheme Based on Umts Aka Protocol for Cognitive Radio Networks
Authors:
Sharareh Vizvari
،
Reza Berangi
،
Khosro Nematollahi
Year 1395
Publish place:
Journal of Knowledge-Based Engineering and Innovation Issue 5، Vol 2
Pages:
10
| Language: English
View And Download
Conference Paper
A Semiautomatic Authentication Method with Virtual Function for Internet Banking Environment
Authors:
Zeinab Zare Hosseini
،
Ehsan Barkhordari
،
Maryam Sadri
Year 1395
Publish place:
The Second International Conference on Web research
Pages:
12
| Language: English
View And Download
Journal Paper
Writer Identity Recognition and Confirmation UsingPersian Handwritten Texts
Authors:
Aida Sheikh
،
Hassan Khotanlou
Year 1394
Publish place:
Advances in Computer Science : an International Journal Issue 6، Vol 4
Pages:
7
| Language: English
View And Download
Conference Paper
A light weight authentication and key agreement protocol for grid systems
Authors:
Saeide Nemati
،
A Rasouli
Year 1394
Publish place:
7th iranian conference on electrical and electronic engineering
Pages:
5
| Language: English
View And Download
Conference Paper
A new method for authentication of the operating system with multi-function usb token
Authors:
Abdollah Fallahi
،
Samira Hakimi
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
7
| Language: English
View And Download
Conference Paper
De-Synchronization attack on the Hash-based mutual authentication protocol
Authors:
Yaser Azimi
،
Akbar Mirzaei
،
Mohammad Hadi Fathi
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
7
| Language: English
View And Download
Conference Paper
A multi authentication scheme for RFID systems
Authors:
Fereshteh Ghasemi
،
Reza Parsamehr
Year 1393
Publish place:
The Second National Conference on Applied Research in Computer Science and Information Technology
Pages:
6
| Language: English
View And Download
Conference Paper
Digital Multimedia Authentication and Forensics
Authors:
Afsaneh taheri
،
Mohammad hosien rezaeiun
Year 1394
Publish place:
The Second International Conference on New Research in Management, Economics and Accounting
Pages:
16
| Language: English
View And Download
Conference Paper
Information Security Diagnosis in Electronic Banking (Case Study: Tejarat Bank’s Branches of Isfahan)
Authors:
Seyed Amin Hosseini Seno
،
Olfat Ganji Bidmeshk
،
Kimia Ghaffari
Year 1394
Publish place:
9th International Conference on e-Commerce with focus on E-Business
Pages:
8
| Language: English
View And Download
Journal Paper
A Strengthened Version of a Hash-based RFID Server-less Security Scheme
Authors:
Shahab Abdolmaleky
،
Shahla Atapoor
،
Mohammad Hajighasemlou
،
Hamid Sharini
Year 1394
Publish place:
Advances in Computer Science : an International Journal Issue 3، Vol 4
Pages:
6
| Language: English
View And Download
نتایج 81 تا 90 از مجموع 120
First
...
6
7
8
9
10
11
12