Apple iPhone .ir

ایران اپل آی-فون آیفون آي-فون آيفون ایفون ايفون ای-فون اي-فون

Monday, August 23, 2010

Sharif Security and Cryptography

Farshid Farhat 's Assistantship Homepage

  • images/farshid.farhat.frash.logo.ico
  • Cryptography Fundamentals
    • cryptfund/7.pdf
  • Cryptography Mathematics
    • cryptmath/1.pdf
    • cryptmath/2.pdf
    • نمرات تمرینات درس ریاضیات رمزنگاری
  • Advanced Cryptography
    • Serpent
  • Data Communication Networks
    • datanet/no1.pdf
  • Network Security
    • طراحی شبکه ها و اصول لایه بندی
    • Cryptography
    • NetSec
    • PKI and Certificate Authority
    • Kerberos
    • Email Security
  • links.htm
  • Contents
  • images/frash.jpg
Posted by blogger at 11:41 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (16)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (1)
  • ►  2016 (5)
    • ►  August (3)
    • ►  June (2)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (10)
    • ►  November (3)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (2)
  • ►  2011 (46)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (20)
    • ►  April (5)
    • ►  March (1)
    • ►  January (7)
  • ▼  2010 (49)
    • ►  December (4)
    • ►  November (5)
    • ►  October (6)
    • ►  September (9)
    • ▼  August (19)
      • سایت ایران فایل هک شد
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • وبلاگ کودکان خیال
      • رمزنگاری و امنیت شبکه
      • Sharif Security and Cryptography
      • Deep Learning and Big Data
      • امنیت
      • Steganalysis using eigenvalues
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • شاخه دانشجویی انجمن رمز ایران
      • Diman Tootaghaj (دیمن توت آغاج)
      • Diman Zad-Tootaghaj (دیمن زادتوت آغاج)
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (5)
    • ►  January (1)
  • ►  2009 (3)
    • ►  November (2)
    • ►  May (1)
  • ►  2008 (4)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

My Blog List

  • Android.ir
    Eigenvalues-based Steganalysis - Behavioral Analog Topology Synthesizerhttps://sites.google.com/site/netlist2scheme/ Cool Teen Buddyhttps://sites.google.com/site/coolteenbuddy/ Diman Zad-T...
    5 years ago
  • Bahram Radan
    How to get a rating for photo aesthetics and composition - Aesthetic Rating for Photos The developed engine gets the image and outputs a score showing the amount of the beauty inside the image! The code is also...
    5 years ago
  • Security the 1st
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Picasa Web Albums - frash
    2019-01-16 - [image: 2019-01-16] Date: Jan 15, 2019 Number of Photos in Album: 1 View Album
    6 years ago
  • Mohammad Reza Golzar
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • frash labels
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • FARSHID FARHAT فرشید فرحت
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • شاخه دانشجویی انجمن رمز ایران
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • HEART
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • ستاره هفتم >> کودکان خیال
    من و تو - تو مهینی تو رحیمی تو خیالی بی رقیبی من نیازم من فرازم خورشیدی در التماسم تو سکوتی تو علوّی تو ...
    7 years ago
  • Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • Persian Girl 003
    Latest done by 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • Girl of Persia 002
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • Persian Girl
    Sites.Google.Com - - Behavioral Analog Topology Synthesizerطراحی کننده توپولوژي مدارهاي آنالوگ درحوزه سيگنال كوچك و فركانس پايين https://sites.google.com/site/ne...
    7 years ago
  • LOVE (عشق) « کودکان خیال
    Academic Endeavors at Pennsylvania State University - Academic Endeavors at Pennsylvania State University Leveraging big visual data to predict severe weather conditions Discovering Triangles in Portraits for ...
    8 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • Heart-script
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • frash yahoo! 360
    Bad children and a box of beverage! - Bad children and a box of beverage! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the ...
    10 years ago
  • Picasa Web Albums - frash - کودکان خیال
    ruwithme.jpg - [image: ruwithme.jpg] Date: May 21, 2010, 2:13 PM Number of Comments on Photo:0 View Photo
    15 years ago
  • Farshid Farhat (farshidfarhat) on Twitter
    -
  • Farshid Farhat's Profile - Windows Live
    -
  • farshid83's favorite websites - StumbleUpon
    -
  • Farshid Farhat's blog on Netlog
    -
  • Farshid Farhat on Netlog
    -
  • شاخه دانشجویی انجمن رمز ایران

Farshid Farhat

Loading...

Diman Zad Tootaghaj

Loading...

Deep Learning

Loading...

BIG DATA Computation

Loading...

Computer Vision and Pattern Recognition

Loading...

Loading...

Loading...

Loading...
Awesome Inc. theme. Powered by Blogger.