لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Reza Ebrahimi Atani
Nasrollah Pakniat
نتایج 31 تا 40 از مجموع 106
1
2
3
4
5
6
7
...
Last
Journal Paper
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Authors:
M. Zeynali
،
H. Seyedarabi
،
B. Mozaffari Tazehkand
Year 1399
Publish place:
Journal of Artificial Intelligence & Data Mining Issue 3، Vol 8
Pages:
14
| Language: English
View And Download
Journal Paper
On group rings and some of their applications to combinatorics and symmetric cryptography
Authors:
Claude Carlet
،
Yin Tan
Year 1394
Publish place:
International Journal of Group Theory Issue 4، Vol 4
Pages:
14
| Language: English
View And Download
Journal Paper
Group rings for communications
Authors:
Ted Hurley
Year 1394
Publish place:
International Journal of Group Theory Issue 4، Vol 4
Pages:
23
| Language: English
View And Download
Journal Paper
Algorithmic problems in Engel groups and cryptographic applications
Authors:
Delaram Kahrobaei
،
Marialaura Noce
Year 1399
Publish place:
International Journal of Group Theory Issue 4، Vol 9
Pages:
20
| Language: English
View And Download
Journal Paper
Visual cryptography scheme on graphs with $m^{*}(G)=۴$
Authors:
Mahmood Davarzani
Year 1398
Publish place:
Transactions on Combinatorics Issue 2، Vol 8
Pages:
14
| Language: English
View And Download
Conference Paper
Providing a Lightweight Message Authentication Scheme for IoT Environment
Authors:
Anahita Aghajani
،
Mahdi Mollamotalebi
Year 1399
Publish place:
Fifth National Conference on Electrical and Computer Engineering
Pages:
7
| Language: English
View And Download
Journal Paper
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains
Authors:
Reza Ebrahimi Atani
،
Shahabaddin Ebrahimi Atani
،
Amir Hassani Karbasi
Year 1397
Publish place:
Journal of Computing and Security Issue 1، Vol 5
Pages:
22
| Language: English
View And Download
Journal Paper
Security Analysis of Two Lightweight Certificateless Signature Schemes
Authors:
Nasrollah Pakniat
Year 1397
Publish place:
Journal of Computing and Security Issue 2، Vol 5
Pages:
7
| Language: English
View And Download
Journal Paper
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs
Authors:
Hamzeh Ghasemzadeh
،
Ali Payandeh
،
Mohammad Reza Aref
Year 1397
Publish place:
International Journal of Information and Communication Technology Research (IJICT Issue 3، Vol 10
Pages:
11
| Language: English
View And Download
Conference Paper
OEA: A novel symmetric cryptography method based on parity attribute
Authors:
Navid Abapour
،
Rasoul Mahboub
Year 1399
Publish place:
7th International Conference on Innovation and Research in Engineering Sciences
Pages:
10
| Language: English
View And Download
نتایج 31 تا 40 از مجموع 106
1
2
3
4
5
6
7
...
Last