skip to main
|
skip to sidebar
2012
Sunday, May 22, 2011
Mahshid Farhat (مهشید فرحت)
Mahshid Farhat (مهشید فرحت)
http://sites.google.com/site/mahshidfarhat/home
http://www.facebook.com/mahshid.farhat
http://profiles.google.com/103514416706735140357
http://picasaweb.google.com/mahshid.farhat
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Blog Archive
►
2017
(12)
►
November
(3)
►
October
(1)
►
September
(2)
►
August
(2)
►
July
(3)
►
May
(1)
►
2016
(2)
►
April
(1)
►
February
(1)
►
2014
(7)
►
November
(5)
►
September
(1)
►
March
(1)
►
2013
(6)
►
July
(1)
►
April
(3)
►
February
(1)
►
January
(1)
►
2012
(13)
►
November
(3)
►
September
(1)
►
July
(1)
►
June
(2)
►
May
(2)
►
March
(2)
►
February
(2)
▼
2011
(53)
►
December
(2)
►
November
(1)
►
October
(2)
►
September
(5)
►
August
(3)
►
July
(1)
►
June
(2)
▼
May
(21)
آموزشگاه موسیقی
Best Golf Bags For Sale
Mahshid Farhat (مهشید فرحت)
Security Improvement of Ad-hoc Networks Routing Pr...
Game-theoretic approach to mitigate packet droppin...
Risk of attack coefficient effect on availability ...
Game-Theoretic Approach in Network Security, Avail...
انجمن رمز ایران
Workshop on Information Hiding Systems
Workshop on A5/1 Algorithm Cryptanalysis
S B I S C @ S U T
Workshop on Design and Cryptanalysis of eVoting Pr...
Workshop on Design and Cryptanalysis of eVoting Pr...
شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف
Workshop on Cryptography and Information Theoretic...
Workshop on Integer Factorization
Workshop on Information Hiding Systems
Workshop on A5/1 Algorithm Cryptanalysis
کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکت...
مقدمه ای بر امنیت شبکه های متحرک بی سیم اقتضایی
Design and Cryptanalysis of E-Voting Protocols Wor...
►
April
(5)
►
March
(1)
►
February
(1)
►
January
(9)
►
2010
(45)
►
December
(3)
►
November
(8)
►
October
(7)
►
September
(8)
►
August
(19)
Loading...
Loading...
Loading...
No comments:
Post a Comment