Mohammad Reza Golzar

محمد رضا گلزار

Thursday, August 19, 2010

Student Branch of Iranian Society of Cryptology

Sharif Student Branch of Iranian Society of Cryptology
شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف

Posted by blogger at 2:29 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (15)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (1)
    • ►  August (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (6)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (8)
    • ►  November (3)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (2)
  • ►  2011 (42)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (6)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (19)
    • ►  April (2)
    • ►  March (1)
    • ►  January (7)
  • ▼  2010 (38)
    • ►  December (2)
    • ►  November (5)
    • ►  October (7)
    • ►  September (7)
    • ▼  August (14)
      • 50 brilliant photos
      • سایت ایران فایل هک شد
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • Steganalysis using eigenvalues
      • Wireless Mobile Adhoc Network Security Simulator
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (3)

My Blog List

  • Absolute Security
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • THE DAWN OF THE DARKNESS
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • Cool Things
    Bella Hadid Shows Off Hot Tennis Outfit, Big Racket -
    8 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • Apply Abroad
    Bad children and a box of beverage bottles! - Bad children and a box of beverage bottles! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children chan...
    10 years ago
  • شاخه دانشجوئی انجمن رمز ایران

Loading...

Loading...

Loading...
Simple theme. Powered by Blogger.