لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
poriya daliry
نتایج 31 تا 40 از مجموع 161
1
2
3
4
5
6
7
...
Last
Journal Paper
Hybrid encryption using playfair and RSA cryptosystems
Authors:
- -
،
- -
Year 1400
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 12
Pages:
6
| Language: English
View And Download
Journal Paper
Implementation of hybrid cryptographic schemes in a cloud environment for enhanced medical data security
Authors:
- -
،
- -
Year 1400
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 12
Pages:
16
| Language: English
View And Download
Journal Paper
A secure biomedical data sharing framework based on mCloud
Authors:
- -
،
- -
Year 1400
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 12
Pages:
13
| Language: English
View And Download
Journal Paper
A Robust Encryption Technique Using Enhanced Vigenre Cipher
Authors:
- -
،
- -
،
- -
Year 1400
Publish place:
International Journal of Nonlinear Analysis and Applications Issue 2، Vol 12
Pages:
8
| Language: English
View And Download
Conference Paper
و HOPE: روش ساخت مدل پیش بینی نقص نرم افزار از طریق رمزگذاریهمومورفیک
Authors:
آشنا محمودی
،
نوید رحیمی
Year 1401
Publish place:
The 8th International Conference on Electrical,computer and mechanical engineering
Pages:
16
| Language: Persian
View And Download
Journal Paper
The Safavid Dynasty and Chronogram
Authors:
Hosein Masjedi
Year 1401
Publish place:
The Journal of Safavid Studies Issue 1، Vol 1
Pages:
12
| Language: English
View And Download
Journal Paper
Image Encryption Using Tent Chaotic Map and Arnold Cat Map
Authors:
Elham Hasani
،
Mohammad Eshghi
Year 1391
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 4
Pages:
7
| Language: English
View And Download
Journal Paper
A secure and robust stereo image encryption algorithm based on DCT and Schur decomposition
Authors:
Kumar
،
M. K.
،
Dobhal
،
Saini
،
Bhatnagar
Year 1401
Publish place:
Journal of Information Technology Management Issue 6، Vol 14
Pages:
21
| Language: English
View And Download
Conference Paper
Security evaluation of the z-wave
Authors:
Poriya Daliry
Year 1400
Publish place:
14th National Conference on Computer Science and Engineering and Information Technology
Pages:
11
| Language: English
View And Download
Journal Paper
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Authors:
Javad Alizadeh
،
Mohammad Reza Aref
،
Nasour Bagheri
،
Alireza Rahimi
Year 1394
Publish place:
Journal of Computing and Security Issue 1، Vol 2
Pages:
18
| Language: English
View And Download
نتایج 31 تا 40 از مجموع 161
1
2
3
4
5
6
7
...
Last