WWW.SANJESH.ORG

sazman sanjesh amoozesh keshvar org orj

Friday, May 6, 2011

شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف

sbisc.sharif.edu
student branch of cryptology
student branch of iranian society of cryptology
شاخه دانشجویی رمز
sbisc
انجمن رمز+کارگاه دانشگاه شریف
شاخه دانشجویی انجمن رمز ایران
farshid farhat security
sbisc.sharif
Posted by blogger at 11:46 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (5)
    • ►  August (3)
    • ►  June (2)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  May (1)
    • ►  April (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (9)
    • ►  November (3)
    • ►  September (1)
    • ►  June (1)
    • ►  May (1)
    • ►  February (3)
  • ▼  2011 (47)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  June (2)
    • ▼  May (20)
      • آموزشگاه موسیقی
      • Best Golf Bags For Sale
      • Mahshid Farhat (مهشید فرحت)
      • Security Improvement of Ad-hoc Networks Routing Pr...
      • Game-theoretic approach to mitigate packet droppin...
      • Risk of attack coefficient effect on availability ...
      • Game-Theoretic Approach in Network Security, Avail...
      • انجمن رمز ایران
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف
      • Workshop on Cryptography and Information Theoretic...
      • Workshop on Integer Factorization
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکت...
      • مقدمه ای بر امنیت شبکه های متحرک بی سیم اقتضایی
      • Design and Cryptanalysis of E-Voting Protocols Wor...
    • ►  April (5)
    • ►  March (1)
    • ►  January (9)
  • ►  2010 (46)
    • ►  December (3)
    • ►  November (5)
    • ►  October (7)
    • ►  September (9)
    • ►  August (18)
    • ►  April (3)
    • ►  January (1)
  • ►  2009 (1)
    • ►  May (1)
  • ►  2007 (6)
    • ►  April (1)
    • ►  March (1)
    • ►  January (4)

My Blog List

  • Absolute Security
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago

Loading...

Loading...

Loading...

Loading...

Loading...
Watermark theme. Powered by Blogger.