skip to main | skip to sidebar

DREAM

Friday, May 6, 2011

شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف

sbisc.sharif.edu
student branch of cryptology
student branch of iranian society of cryptology
شاخه دانشجویی رمز
sbisc
انجمن رمز+کارگاه دانشگاه شریف
شاخه دانشجویی انجمن رمز ایران
farshid farhat security
sbisc.sharif
Posted by blogger at 12:16 PM
Labels: شاخه دانشجویی انجمن رمز ایران

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2017 (12)
    • ►  November (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2016 (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (13)
    • ►  November (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  March (2)
    • ►  February (3)
  • ▼  2011 (57)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (1)
    • ►  June (2)
    • ▼  May (21)
      • آموزشگاه موسیقی
      • Best Golf Bags For Sale
      • Mahshid Farhat (مهشید فرحت)
      • Security Improvement of Ad-hoc Networks Routing Pr...
      • Game-theoretic approach to mitigate packet droppin...
      • Risk of attack coefficient effect on availability ...
      • Game-Theoretic Approach in Network Security, Avail...
      • انجمن رمز ایران
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • S B I S C @ S U T
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف
      • Workshop on Cryptography and Information Theoretic...
      • Workshop on Integer Factorization
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکت...
      • مقدمه ای بر امنیت شبکه های متحرک بی سیم اقتضایی
      • Design and Cryptanalysis of E-Voting Protocols Wor...
    • ►  April (5)
    • ►  March (1)
    • ►  February (2)
    • ►  January (10)
  • ►  2010 (53)
    • ►  December (4)
    • ►  November (9)
    • ►  October (7)
    • ►  September (8)
    • ►  August (20)
    • ►  April (4)
    • ►  January (1)
  • ►  2009 (11)
    • ►  November (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (11)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2007 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2006 (26)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (5)
    • ►  April (4)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2005 (18)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Forgotten Dream
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Security the 1st
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • IRANCELL.ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Hacks News
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • Cryptology
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Cryptography
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Sazman Sanjesh (سازمان سنجش)
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • The Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • frash
    List done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • MCI.ir
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago

Loading...

Loading...

Loading...

Loading...

Loading...