x83

Tuesday, April 26, 2011

Information Systems and Security Lab

Information Systems and Security Lab

Home

  • People
  • Groups
  • Publications
    • papers/ghabeli/Commletter.pdf
    • papers/ghabeli/IET1.pdf
    • papers/ghabeli/IET2.pdf
    • papers/salimi/IET1.pdf
    • papers/salimi/IET2.pdf
    • papers/yassae/Yasaee Slepian-Wolf Coding Over Cooperative Relay Networks.pdf
    • papers/akhbari/IET_5494868.pdf
    • papers/akhbari/ITW09.pdf
    • papers/farhat
    • papers/farhat/lmar.pdf
    • papers/farhat/1569353017.pdf
    • papers/farhat/1569353021.pdf
  • Links
  • Contents
  • Contact



Posted by blogger at 1:30 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (1)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (7)
    • ►  August (1)
    • ►  July (1)
    • ►  May (1)
    • ►  April (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (10)
    • ►  November (3)
    • ►  September (1)
    • ►  July (2)
    • ►  May (2)
    • ►  February (2)
  • ▼  2011 (48)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  June (2)
    • ►  May (20)
    • ▼  April (5)
      • Information Systems and Security Lab
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Cryptography and Information Theoretic Security Wo...
    • ►  March (1)
    • ►  January (9)
  • ►  2010 (47)
    • ►  December (3)
    • ►  November (5)
    • ►  October (7)
    • ►  September (8)
    • ►  August (20)
    • ►  April (4)
  • ►  2006 (1)
    • ►  September (1)
  • شاخه دانشجویی انجمن رمز ایران

My Blog List

  • Absolute Security
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago

Loading...

Loading...

Loading...
Simple theme. Theme images by luoman. Powered by Blogger.