Zobrazeno 1 - 10
of 99
pro vyhledávání: '"AZIZI, MOSTAFA"'
Autor:
Michel, Magdalena M.1 (AUTHOR), Azizi, Mostafa1 (AUTHOR) mostafa_azizi@sggw.edu.pl, Mirosław-Świątek, Dorota1 (AUTHOR), Reczek, Lidia1 (AUTHOR), Cieniek, Bogumił2 (AUTHOR), Sočo, Eleonora3 (AUTHOR)
Publikováno v:
International Journal of Molecular Sciences. Mar2023, Vol. 24 Issue 5, p4448. 12p.
Autor:
Azizi, Mostafa1 (AUTHOR), Teymourian, Targol2 (AUTHOR), Teymoorian, Termeh3 (AUTHOR), Gheibi, Mohammad4,5 (AUTHOR), Kowsari, Elaheh3 (AUTHOR) Kowsarie@aut.ac.ir, Hajiaghaei–Keshteli, Mostafa5 (AUTHOR), Ramakrishna, Seeram6 (AUTHOR) seeram@nus.edu.sg
Publikováno v:
Research on Chemical Intermediates. Jan2023, Vol. 49 Issue 1, p341-370. 30p.
Autor:
Azizi, Mostafa
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
Externí odkaz:
http://hdl.handle.net/1866/30688
Publikováno v:
In Procedia Computer Science 2019 148:37-44
Publikováno v:
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, pages 55-61, 2011
Thanks to the potential they hold and the variety of their application domains, Multimedia Wireless Sensor Networks (MWSN) are forecast to become highly integrated into our daily activities. Due to the carried content nature, mainly composed of image
Externí odkaz:
http://arxiv.org/abs/1201.3950
Publikováno v:
International Journal of Network Security & Its Applications 2.2 (2010) 87-98
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on
Externí odkaz:
http://arxiv.org/abs/1005.4504
Publikováno v:
In Procedia Computer Science 2018 127:531-538
Publikováno v:
International Journal of Interactive Mobile Technologies (iJIM); Vol. 16 No. 15 (2022); pp. 4-15
Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security policy, it i
Publikováno v:
International Journal of Online & Biomedical Engineering; 2023, Vol. 19 Issue 17, p66-97, 32p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.