لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Nasrollah Pakniat
نتایج 11 تا 20 از مجموع 30
1
2
3
Journal Paper
بازخوانی تفسیر راز افشا شده در آیه ۳ تحریم با تاکید بر سیاق و روایات تفسیری اهل بیت (علیهم السلام).
Authors:
محمدرضا شاه سنائی
،
عباس اسماعیلی زاده
Year 1400
Publish place:
Safineh Issue 73، Vol 19
Pages:
19
| Language: Persian
View And Download
Journal Paper
Efficient Verifiable Dynamic Threshold Secret Sharing Scheme Based on Elliptic Curves
Authors:
Amir Alaei
،
Mohammad Hesam Tadayon
Year 1394
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 4، Vol 7
Pages:
8
| Language: English
View And Download
Journal Paper
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Authors:
Mohammad Ali Hadavi
،
Rasool Jalili
،
Javad Ghareh Chamani
Year 1394
Publish place:
Journal of Computing and Security Issue 2، Vol 2
Pages:
21
| Language: English
View And Download
Journal Paper
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model
Authors:
Nasrollah Pakniat
،
Ziba Eslami
Year 1396
Publish place:
Journal of Computing and Security Issue 1، Vol 4
Pages:
10
| Language: English
View And Download
Journal Paper
ارائه روشی کارا برای پنهان نگاری بدون اتلاف و با ظرفیت جاسازی بالای تصاویر محرمانه
Authors:
عارف رضائی
،
مهسا ضامنی
،
لیلی فرزین وش
Year 1400
Publish place:
Journal of Iranian Association of Electrical and Electronics Engineers Issue 3، Vol 18
Pages:
12
| Language: Persian
View And Download
Journal Paper
A Study on Multisecret-Sharing Schemes Based on Linear Codes
Authors:
Selda Çalkavur
Year 1399
Publish place:
Italian Journal of Science & Engineering Issue 4، Vol 4
Pages:
9
| Language: English
View And Download
Conference Paper
A secret sharing scheme by automata
Authors:
Ali Saeidi Rashkolia
Year 1399
Publish place:
11th International Conference on Information Technology, Computer and Telecommunications
Pages:
5
| Language: English
View And Download
Journal Paper
Visual cryptography scheme on graphs with $m^{*}(G)=۴$
Authors:
Mahmood Davarzani
Year 1398
Publish place:
Transactions on Combinatorics Issue 2، Vol 8
Pages:
14
| Language: English
View And Download
Journal Paper
Ideal secret sharing schemes on graph-based $۳$-homogeneous access structures
Authors:
Shahrooz Janbaz
،
Bagher Bagherpour
،
Ali Zaghian
Year 1400
Publish place:
Transactions on Combinatorics Issue 2، Vol 10
Pages:
14
| Language: English
View And Download
Journal Paper
Full Secret Disclosure Attack against an EPC- C۱ G۲ Compliant Authentication Protocol
Authors:
Masoumeh Safkhani
Year 1398
Publish place:
Journal of Computing and Security Issue 1، Vol 6
Pages:
11
| Language: English
View And Download
نتایج 11 تا 20 از مجموع 30
1
2
3