لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
AliMohammad Latif
نتایج 1 تا 10 از مجموع 110
1
2
3
4
...
Last
Security and Reliability of Consensus Algorithms in Post-Quantum Blockchains
Authors:
حمید نیکخواه
Year 1403
Pages:
18
| Language: English
View And Download
Conference Paper
A solution for wireless sensor networks security by improving the key distribution method
Authors:
Soheil Samanabadi
،
Sahar Khatir
Year 1403
Publish place:
1st international conference on information technology, management and computer
Pages:
5
| Language: English
View And Download
Journal Paper
Lightweight secure message transfer protocol based on ECC (Nist P-۲۵۶) Internet of Things equipped with satellite communications
Authors:
Mahdi Baghaei Jezehei
،
Seyed Ahmad Olamaei
،
Ali Broumandnia
Year 1404
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 4، Vol 16
Pages:
10
| Language: English
View And Download
Journal Paper
Novel Architecture for Efficient Implementation of Modular Exponentiation Algorithm
Authors:
Abdalhossein Rezai
Year 1403
Publish place:
International Journal of Web Research Issue 1، Vol 7
Pages:
7
| Language: English
View And Download
Journal Paper
A new public key cryptography using M_{q} matrix
Authors:
Azadeh Naseri
،
Ahmad Abbasi
،
Reza Atani
Year 1402
Publish place:
Journal of Mathematical Modeling Issue 4، Vol 11
Pages:
13
| Language: English
View And Download
Journal Paper
Frequency Analysis of the English Language in Decrypting English Texts
Authors:
Valieva Gulnara Firdusovna
،
Eremeeva Guzel Rinatovna
،
Martynova Ekaterina Vladimirovnа
Year 1398
Publish place:
Journal of Research in Applied Linguistics Issue 0، Vol 10
Pages:
11
| Language: English
View And Download
Conference Paper
Study of Cryptography in Cloud Computing
Authors:
Asif Hujilin
،
Aklipar Husainpilo
Year 1402
Publish place:
The first international conference on engineering and information technology
Pages:
11
| Language: English
View And Download
Journal Paper
Comparison of two Public Key Cryptosystems
Authors:
mahnaz mohammadi
،
alireza zolghadr
،
mohammad pourmina
Year 1397
Publish place:
Journal of Optoelectronical Nanostructures Issue 3، Vol 3
Pages:
12
| Language: English
View And Download
Journal Paper
Cryptographic Algorithms: A Review of the Literature, Weaknesses and Open Challenges
Authors:
Yashar Salami
،
Vahid Khajevand
،
Esmaeil Zeinali
Year 1402
Publish place:
Journal of Computer and Robotics Issue 2، Vol 16
Pages:
53
| Language: English
View And Download
Journal Paper
High-quality Visual Cryptography of Real-value Images without Pixel Expansion using Fuzzy Random Grids
Authors:
Mostafa Mokhtari Ardakan
،
Reza Ramezani
،
Ali Mohammad Latif
Year 1402
Publish place:
Iranian Journal of Fuzzy Systems Issue 6، Vol 20
Pages:
27
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 110
1
2
3
4
...
Last