skip to main | skip to sidebar

DREAM

Thursday, August 19, 2010

Student Branch of Iranian Society of Cryptology

Sharif Student Branch of Iranian Society of Cryptology
شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف

Posted by blogger at 2:29 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2017 (12)
    • ►  November (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2016 (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (13)
    • ►  November (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  March (2)
    • ►  February (3)
  • ►  2011 (57)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (21)
    • ►  April (5)
    • ►  March (1)
    • ►  February (2)
    • ►  January (10)
  • ▼  2010 (53)
    • ►  December (4)
    • ►  November (9)
    • ►  October (7)
    • ►  September (8)
    • ▼  August (20)
      • سایت ایران فایل هک شد
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • وبلاگ کودکان خیال
      • تجدید فراش
      • رمزنگاری و امنیت شبکه
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • امنیت
      • Steganalysis using eigenvalues
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • شاخه دانشجویی انجمن رمز ایران
      • Diman Tootaghaj (دیمن توت آغاج)
      • Diman Zad-Tootaghaj (دیمن زادتوت آغاج)
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (4)
    • ►  January (1)
  • ►  2009 (11)
    • ►  November (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (11)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2007 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2006 (26)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (5)
    • ►  April (4)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2005 (18)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Forgotten Dream
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Security the 1st
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • IRANCELL.ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Hacks News
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • Cryptology
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Cryptography
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Sazman Sanjesh (سازمان سنجش)
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • The Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • frash
    List done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • MCI.ir
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago

Loading...

Loading...

Loading...

Loading...

Loading...