لطفا کمی صبر نمایید ...
ورود
Advanced Search
Thesis
مقالات فارسی
ISI
کنفرانسها
ژورنالها
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Login / Register
Papers
ISI
EVENTS
Journals
PPROCEEDINGS
Meetings
Thesis
Dark Mode
استعلام پایان نامه
جستجوی مقالات داخلی
Catehory
Conference Papers
Journal Papers
Books
Plans
Research documents
Rports
Result Type:
Full Text
Has Word File
Search regardless of the position of the words
Limit article publication year to:
All years
Specific years:
Search
Show
All Information
Only Paper Title
Item Per Page
10
20
Sort By
Paper title
Year
Indexing
ABS
DESC
فیلتر نتایج
Mohammad Khansari
نتایج 1 تا 10 از مجموع 15
1
2
Journal Paper
Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases
Authors:
Mohammad Ali Hadavi
،
Rasool Jalili
،
Javad Ghareh Chamani
Year 1394
Publish place:
Journal of Computing and Security Issue 2، Vol 2
Pages:
21
| Language: English
View And Download
Journal Paper
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
Authors:
Hadi Halvachi
،
Mohammad Hadavi
،
Rasool Jalili
Year 1395
Publish place:
Journal of Computing and Security Issue 2، Vol 3
Pages:
11
| Language: English
View And Download
Journal Paper
A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing
Authors:
Morteza Noferesti
،
Simin Ghasemi
،
Mohammad Ali Hadavi
،
Rasool Jalili
Year 1393
Publish place:
Journal of Computing and Security Issue 1، Vol 1
Pages:
12
| Language: English
View And Download
Journal Paper
An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols
Authors:
Hamid Reza Mahrooghi
،
Rasool Jalili
Year 1398
Publish place:
Journal of Computing and Security Issue 1، Vol 6
Pages:
18
| Language: English
View And Download
Conference Paper
Runtime Validity of Dynamic Reconfiguration in Component-based Programs
Authors:
Mahdi Niamanesh
،
Faranak Heydarian Dehkordi
،
Rasool Jalili
Year 1384
Publish place:
11th Annual Conference of Computer Society of Iran
Pages:
5
| Language: English
View And Download
Conference Paper
Modeling and Verification of Complex Network Attacks Using an Actor-Based Language
Authors:
Hamid Reza Shahriari
،
Mohammad Sadegh Makarem,
،
Marjan Sirjani
،
Rasool Jalili,
Year 1384
Publish place:
11th Annual Conference of Computer Society of Iran
Pages:
7
| Language: English
View And Download
Conference Paper
An Efficient Solution for Access Control Management on Outsourced Data Preserving Access Control Policy Privacy
Authors:
Parastou Tourani
،
Ali Hadavi
،
Rasool Jalili
Year 1389
Publish place:
07th Iranian Security Community Conference
Pages:
8
| Language: English
View And Download
Conference Paper
attack plan recognition using markov model
Authors:
hamid farhadi
،
rasool jalili
،
mohammad khansari
Year 1389
Publish place:
07th Iranian Security Community Conference
Pages:
8
| Language: English
View And Download
Conference Paper
Universally Composable Priced Oblivious Transfer
Authors:
Yasser Sobhdel
،
Mohammad Sadeq Dousti
،
Rasool Jalili
Year 1389
Publish place:
07th Iranian Security Community Conference
Pages:
9
| Language: English
View And Download
Conference Paper
RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from Intrusion Alert Stream
Authors:
Maryam AmirHaeri,
،
Rasool Jalili
Year 1388
Publish place:
6th Iranian Security Community Conference
Pages:
8
| Language: English
View And Download
نتایج 1 تا 10 از مجموع 15
1
2