skip to main | skip to sidebar

Eternal Goal

Monday, August 23, 2010

رمزنگاری و امنیت شبکه

Farshid Farhat 's Assistantship Homepage

  • images/farshid.farhat.frash.logo.ico
  • Cryptography Fundamentals
    • cryptfund/7.pdf
  • Cryptography Mathematics
    • cryptmath/1.pdf
    • cryptmath/2.pdf
    • نمرات تمرینات درس ریاضیات رمزنگاری
  • Advanced Cryptography
    • Serpent
  • Data Communication Networks
    • datanet/no1.pdf
  • Network Security
    • طراحی شبکه ها و اصول لایه بندی
    • Cryptography
    • NetSec
    • PKI and Certificate Authority
    • Kerberos
    • Email Security
  • links.htm
  • Contents
  • images/frash.jpg
Posted by blogger at 11:53 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2017 (12)
    • ►  November (3)
    • ►  October (1)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2016 (1)
    • ►  April (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (7)
    • ►  July (2)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (12)
    • ►  November (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  March (2)
    • ►  February (3)
  • ►  2011 (55)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  September (5)
    • ►  August (3)
    • ►  July (1)
    • ►  June (2)
    • ►  May (21)
    • ►  April (5)
    • ►  March (1)
    • ►  February (2)
    • ►  January (9)
  • ▼  2010 (51)
    • ►  December (4)
    • ►  November (8)
    • ►  October (6)
    • ►  September (8)
    • ▼  August (21)
      • سایت ایران فایل هک شد
      • زلزله در نزدیکی تهران - 6 شهریور 1389
      • National Search Engine موتور جستجو گر ملی وب
      • National Web Browser مرورگر ملی وب
      • Extra Security فرا امنیت
      • وبلاگ کودکان خیال
      • رمزنگاری و امنیت شبکه
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • امنیت
      • Steganalysis using eigenvalues
      • Wireless Mobile Adhoc Network Security Simulator
      • Wireless Mobile Ad-hoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • شاخه دانشجویی انجمن رمز ایران در دانشگاه صنعتی شریف
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • شاخه دانشجویی انجمن رمز ایران
      • Diman Tootaghaj (دیمن توت آغاج)
      • Diman Zad-Tootaghaj (دیمن زادتوت آغاج)
      • Game-Theoretic Network Simulator (GTNS)
    • ►  April (3)
    • ►  January (1)
  • ►  2009 (13)
    • ►  November (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (4)
    • ►  January (1)
  • ►  2008 (11)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2007 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2006 (25)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (5)
    • ►  April (4)
    • ►  March (3)
    • ►  February (1)
    • ►  January (2)
  • ►  2005 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments
  • فرحت

My Blog List

  • 300 THE MOVIE (Three Hundred)
    MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES - MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES Author: Zad Tootaghaj, Diman Graduate Program: Computer Science ...
    6 years ago
  • frash next generation
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • HEART
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • frash labels
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo Taking Auction-based Resource Management in Computer Architecture Professional portrait dataset Enh...
    6 years ago
  • Amadeus
    Situs Anime Terbaik - Saat ini Anime adalah film yang sangat digandrungi oleh semua umur. Dari anak-anak,remaja bahkan sampai orang tua pun suka menonton Anime.Entah itu untuk...
    6 years ago
  • The Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago
  • FARHAT
    Google Sites - - Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhat https://sites.google.com/site/farshidfarha...
    7 years ago
  • DREAM
    Google Sites - - Farshid Farhat 's Google-SiteYou will find the links to other resources related to Farshid Farhat https://sites.google.com/site/farshidfarha...
    7 years ago
  • mp3 music playlist
    SITES.PSU.EDU - Behavioral Analog Topology SynthesizerOptical CDMA Network Simulator (OCNS)Persian Boy NamesPersian Girl NamesExtended Authentication and Key Agreement Pro...
    7 years ago
  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago
  • frash yahoo! 360
    Bad children and a box of beverage! - Bad children and a box of beverage! D. and F. provided one beverage box with 32 bottles for the weekend party, but one of their four children changed the ...
    10 years ago
  • Farshid Farhat - Google Profile
    -

Loading...

Loading...

Loading...