All Of Latest Presentations and Abstracts:

-----------------------------------------------------------------------------------------------------------------------Esfand

  Saturday, (92/12/24)    (2014/03/15), at 3:00 PM

   Mohammad Hashem Haghighat

   presentation techniques of accurate and efficient

  View Abstract

----------------------

  Saturday, (92/12/17)    (2014/03/08), at 3:00 PM

  Mohammad Sadegh Dousti

  Access Control in Windows Operating System (Part 2)

  View Abstract

----------------------

  Saturday, (92/12/10)    (2014/03/01), at 3:00 PM

  Dr. Hamidreza Mirzaei

  Quantum Computers: Introduction, Applications and basics of Semiconductor Spin-based Quantum Computers

  View Abstract

----------------------

  Saturday, (92/12/03)    (2014/02/22), at 3:00 PM

  Mohammad Mokhtari

  Fully Homomorphic Encryption System and its Application in Private Information Retrieval Protocol

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Bahman

  Saturday, (92/11/26)    (2014/02/15), at 3:00 PM

  Mehrshad Vosough

  Hardware Trojan Robust Register Placement of Application Specific Integrated Circuits

  View Abstract

----------------------

  Saturday, (92/11/19)    (2014/02/08), at 3:00 PM

  Mohammad Naderi

  Security Operations Centers (SOC); Why and How to Setup

  View Abstract

----------------------

  Saturday, (92/11/12)    (2014/02/01), at 3:00 PM

  Morteza Noferesti

  Verifying system properties with Linear Temporal Logic

  View Abstract

----------------------

  Saturday, (92/11/05)    (2014/01/25), at 3:00 PM

  Dr. Hassan Tabatabaei

  Cloud Computing Architectures (Cloud Computing Architectures)

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Dey

  Saturday, (92/10/28)    (2014/01/18), at 9:00 AM

  Hassan Mokhtari Sangchi

  Software security Evaluation Approaches

  View Abstract

----------------------

  Saturday, (92/10/21)    (2014/01/11), at 9:00 AM

  Farid Zarrinkhat

  Seven new block cipher structures with provable security against Differential cryptanalysis(part 1)

  View Abstract

----------------------

  Saturday, (92/10/14)    (2014/01/04), at 9:00 AM

  Hossein Teimoori (Presentation File)

  ISMS Implementation & Certification Process Challenges

  View Abstract

----------------------

  Saturday, (92/10/07)    (2013/12/28), at 9:00 AM

  Ahmad Boorghany (Presentation File) (Film)

  Current Trends in Cryptology: An ASIACRYPT'13 Review

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Azar

  Saturday, (92/09/30)    (2013/12/21), at 9:00 AM

  Davood Salari Panah

  Single Sign-on Protocol Based on Verifiable Encryption of Signature

  View Abstract

----------------------

  Saturday, (92/09/23)    (2013/12/14), at 9:00 AM

  Mostafa Tamtaji (Presentation File)

  ISMS Implementation Based on RUP (SUP)

  View Abstract

----------------------

  Saturday, (92/09/16)    (2013/12/07), at 9:00 AM

  Ahmad Sepahi

  A Comprehensive Approach to Similarity-Based Alert Correlation

  View Abstract

----------------------

  Saturday, (92/09/09)    (2013/11/30), at 9:00 AM

  Elahe Sadat Najmabadi

  Confidential Access to the Outsourced Data

  View Abstract

----------------------

  Saturday, (92/09/02)    (2013/11/23), at 9:00 AM

  Ali Dad

   Petri nets & security modeling

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Aban

  Saturday, (92/08/25)    (2013/11/16), at 9:00 AM

  Mahmood Ghorbanzadeh (Ref#1) (Ref#2) (Ref#3)

  Data Structure Reverse Engineering

  View Abstract

----------------------

  Saturday, (92/08/18)    (2013/11/09), at 9:00 AM

  Mohammad Ali Hadavi

  Security Challenges of Data Outsourcing and Provably Secure Schemes (Film)

  View Abstract

----------------------

  Saturday, (92/08/11)    (2013/11/02), at 9:00 AM

  Behnam Momeni

  Methodological Research: Process, Tools, and Techniques (Film)

  View Abstract

----------------------

  Saturday, (92/08/04)    (2013/10/26 at 9:00 AM

  Alireza Shahhoseini

  An Introduction to Security in Distributed Cognitive Radio networks

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Mehr

  Saturday, (92/07/27)    (2013/10/19), at 9:00 AM

  Mohammad Sadegh Dousti

  Access Control in Windows Operating System (Part 1) (Film)

  View Abstract

----------------------

  Saturday, (92/07/20)    (2013/10/12), at 9:00 AM

  Ahmad Boorghani

  How to Bias Boolean Functions, and Applications to Attack Tamper-Resilient Cryptography

  View Abstract

----------------------

  Saturday, (92/07/13)    (2013/10/05), at 9:00 AM

  Atefeh Sarkari

  A Trust Model Evaluation Test-bed

  View Abstract

----------------------

  Saturday, (92/07/06)    (2013/09/28), at 9:00 AM

  Ali Ahmadian

  Alert Correlation in Early Warning System

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Shahrivar

  Saturday, (92/06/30)    (2013/09/21), at 9:00 AM

  Hadi Halvachi

  A Secure DBMS Architecture to Preserve Data Confidentiality and Integrity

  View Abstract

----------------------

  Saturday, (92/06/23)    (2013/09/14), at 9:00 AM

  Roohollah Mahfoozi

  Using "Functional Encryption" to manage encrypted data

  View Abstract

----------------------

  Saturday, (92/06/16)    (2013/09/07), at 9:00 AM

  Ali Reza Toroghi Haghighat

  Analyse E-Voting protocol

  View Abstract

----------------------

  Saturday, (92/06/09)    (2013/08/31), at 9:00 AM

  Mohammad Ali Kargar

  Against Desynchronization Attack

  View Abstract

----------------------

  Saturday, (92/06/02)    (2013/08/24), at 9:00 AM

  Mohammad Reza Raziyan

  DoS Attack

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Mordad

  Saturday, (92/05/26)    (2013/08/17), at 9:00 AM

  Ali Reza Toroghi Haghighat

  Assumptions in E-Voting protocols

  View Abstract

----------------------

  Saturday, (92/05/12)    (2013/08/03), at 9:00 AM

  Vahid Khodabakhshi

  Chaos-based Selective Key (CSK) Cryptosystem:A New Direction to Secure VPN

  View Abstract

----------------------

  Saturday, (92/05/05)    (2013/07/27), at 9:00 AM

  Ali Akbari

  Preserving Privacy in Publishing Social Network Dataset

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Tir

  Saturday, (92/04/29)    (2013/07/20), at 9:00 AM

  Hashem Habibi

  Security and Privacy-Enhancing Multicloud Architectures

  View Abstract

----------------------

  Saturday, 92/04/15, at 9:00 AM

  Hadi Halvachi

  Index Generator for data string in crypto DBMS

  View Abstract

----------------------

  Saturday, 92/04/08, at 9:00 AM

  Dr. Rasool Ramezanian

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Khordad

  Saturday, 92/03/25, at 9:00 AM

  Ali Reza Haghighat

  View Abstract

----------------------

  Saturday, 92/03/04, at 9:00 AM

  Mahmood Neshati

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Ordibehesht

  Saturday, 92/02/28, at 9:00 AM

  Mehdi Soltani

  View Abstract

----------------------

  Saturday, 92/02/21, at 9:00 AM

  Roohollah Mahfoozi

  View Abstract

----------------------

  Saturday, 92/02/14, at 9:00 AM

  Davood Salari

  View Abstract

----------------------

  Saturday, 92/02/07, at 9:00 AM

  Somayeh Dovlatnezhad

  View Abstract

-----------------------------------------------------------------------------------------------------------------------Farvardin

  Saturday, 92/01/31, at 9:00 AM

  Hadi Halvachi

  View Abstract

----------------------

  Saturday, 92/01/24, at 9:00 AM

  Hashem Habibi

  View Abstract

----------------------

  Saturday, 92/01/17, at 9:00 AM

  Ahmad Boorghany

  View Abstract