Sharif University, Computer Department
-----------------------------------------------------------------------------------------------------------------------Esfand
Saturday, (92/12/24) (2014/03/15), at 3:00 PM
Mohammad Hashem Haghighat
presentation techniques of accurate and efficient
----------------------
Saturday, (92/12/17) (2014/03/08), at 3:00 PM
Mohammad Sadegh Dousti
Access Control in Windows Operating System (Part 2)
----------------------
Saturday, (92/12/10) (2014/03/01), at 3:00 PM
Dr. Hamidreza Mirzaei
Quantum Computers: Introduction, Applications and basics of Semiconductor Spin-based Quantum Computers
----------------------
Saturday, (92/12/03) (2014/02/22), at 3:00 PM
Mohammad Mokhtari
Fully Homomorphic Encryption System and its Application in Private Information Retrieval Protocol
-----------------------------------------------------------------------------------------------------------------------Bahman
Saturday, (92/11/26) (2014/02/15), at 3:00 PM
Mehrshad Vosough
Hardware Trojan Robust Register Placement of Application Specific Integrated Circuits
----------------------
Saturday, (92/11/19) (2014/02/08), at 3:00 PM
Mohammad Naderi
Security Operations Centers (SOC); Why and How to Setup
----------------------
Saturday, (92/11/12) (2014/02/01), at 3:00 PM
Morteza Noferesti
Verifying system properties with Linear Temporal Logic
----------------------
Saturday, (92/11/05) (2014/01/25), at 3:00 PM
Dr. Hassan Tabatabaei
Cloud Computing Architectures (Cloud Computing Architectures)
-----------------------------------------------------------------------------------------------------------------------Dey
Saturday, (92/10/28) (2014/01/18), at 9:00 AM
Hassan Mokhtari Sangchi
Software security Evaluation Approaches
----------------------
Saturday, (92/10/21) (2014/01/11), at 9:00 AM
Farid Zarrinkhat
Seven new block cipher structures with provable security against Differential cryptanalysis(part 1)
----------------------
Saturday, (92/10/14) (2014/01/04), at 9:00 AM
Hossein Teimoori (Presentation File)
ISMS Implementation & Certification Process Challenges
----------------------
Saturday, (92/10/07) (2013/12/28), at 9:00 AM
Ahmad Boorghany (Presentation File) (Film)
Current Trends in Cryptology: An ASIACRYPT'13 Review
-----------------------------------------------------------------------------------------------------------------------Azar
Saturday, (92/09/30) (2013/12/21), at 9:00 AM
Davood Salari Panah
Single Sign-on Protocol Based on Verifiable Encryption of Signature
----------------------
Saturday, (92/09/23) (2013/12/14), at 9:00 AM
Mostafa Tamtaji (Presentation File)
ISMS Implementation Based on RUP (SUP)
----------------------
Saturday, (92/09/16) (2013/12/07), at 9:00 AM
Ahmad Sepahi
A Comprehensive Approach to Similarity-Based Alert Correlation
----------------------
Saturday, (92/09/09) (2013/11/30), at 9:00 AM
Elahe Sadat Najmabadi
Confidential Access to the Outsourced Data
----------------------
Saturday, (92/09/02) (2013/11/23), at 9:00 AM
Ali Dad
Petri nets & security modeling
-----------------------------------------------------------------------------------------------------------------------Aban
Saturday, (92/08/25) (2013/11/16), at 9:00 AM
Mahmood Ghorbanzadeh (Ref#1) (Ref#2) (Ref#3)
Data Structure Reverse Engineering
----------------------
Saturday, (92/08/18) (2013/11/09), at 9:00 AM
Mohammad Ali Hadavi
Security Challenges of Data Outsourcing and Provably Secure Schemes (Film)
----------------------
Saturday, (92/08/11) (2013/11/02), at 9:00 AM
Behnam Momeni
Methodological Research: Process, Tools, and Techniques (Film)
----------------------
Saturday, (92/08/04) (2013/10/26 at 9:00 AM
Alireza Shahhoseini
An Introduction to Security in Distributed Cognitive Radio networks
-----------------------------------------------------------------------------------------------------------------------Mehr
Saturday, (92/07/27) (2013/10/19), at 9:00 AM
Mohammad Sadegh Dousti
Access Control in Windows Operating System (Part 1) (Film)
----------------------
Saturday, (92/07/20) (2013/10/12), at 9:00 AM
Ahmad Boorghani
How to Bias Boolean Functions, and Applications to Attack Tamper-Resilient Cryptography
----------------------
Saturday, (92/07/13) (2013/10/05), at 9:00 AM
Atefeh Sarkari
A Trust Model Evaluation Test-bed
----------------------
Saturday, (92/07/06) (2013/09/28), at 9:00 AM
Ali Ahmadian
Alert Correlation in Early Warning System
-----------------------------------------------------------------------------------------------------------------------Shahrivar
Saturday, (92/06/30) (2013/09/21), at 9:00 AM
Hadi Halvachi
A Secure DBMS Architecture to Preserve Data Confidentiality and Integrity
----------------------
Saturday, (92/06/23) (2013/09/14), at 9:00 AM
Roohollah Mahfoozi
Using "Functional Encryption" to manage encrypted data
----------------------
Saturday, (92/06/16) (2013/09/07), at 9:00 AM
Ali Reza Toroghi Haghighat
Analyse E-Voting protocol
----------------------
Saturday, (92/06/09) (2013/08/31), at 9:00 AM
Mohammad Ali Kargar
Against Desynchronization Attack
----------------------
Saturday, (92/06/02) (2013/08/24), at 9:00 AM
Mohammad Reza Raziyan
DoS Attack
-----------------------------------------------------------------------------------------------------------------------Mordad
Saturday, (92/05/26) (2013/08/17), at 9:00 AM
Ali Reza Toroghi Haghighat
Assumptions in E-Voting protocols
----------------------
Saturday, (92/05/12) (2013/08/03), at 9:00 AM
Vahid Khodabakhshi
Chaos-based Selective Key (CSK) Cryptosystem:A New Direction to Secure VPN
----------------------
Saturday, (92/05/05) (2013/07/27), at 9:00 AM
Ali Akbari
Preserving Privacy in Publishing Social Network Dataset
-----------------------------------------------------------------------------------------------------------------------Tir
Saturday, (92/04/29) (2013/07/20), at 9:00 AM
Hashem Habibi
Security and Privacy-Enhancing Multicloud Architectures
----------------------
Saturday, 92/04/15, at 9:00 AM
Hadi Halvachi
Index Generator for data string in crypto DBMS
----------------------
Saturday, 92/04/08, at 9:00 AM
Dr. Rasool Ramezanian
-----------------------------------------------------------------------------------------------------------------------Khordad
Saturday, 92/03/25, at 9:00 AM
Ali Reza Haghighat
----------------------
Saturday, 92/03/04, at 9:00 AM
Mahmood Neshati
-----------------------------------------------------------------------------------------------------------------------Ordibehesht
Saturday, 92/02/28, at 9:00 AM
Mehdi Soltani
----------------------
Saturday, 92/02/21, at 9:00 AM
Roohollah Mahfoozi
----------------------
Saturday, 92/02/14, at 9:00 AM
Davood Salari
----------------------
Saturday, 92/02/07, at 9:00 AM
Somayeh Dovlatnezhad
-----------------------------------------------------------------------------------------------------------------------Farvardin
Saturday, 92/01/31, at 9:00 AM
Hadi Halvachi
----------------------
Saturday, 92/01/24, at 9:00 AM
Hashem Habibi
----------------------
Saturday, 92/01/17, at 9:00 AM
Ahmad Boorghany
Copyright © 2012 - All Rights Reserved for DNSL
This page was last modified: