skip to main | skip to sidebar

Life Inception

Sunday, May 22, 2011

Security Improvement of Ad-hoc Networks Routing Protocol

Security Improvement of Ad-hoc Networks Routing Protocol
ارتقاء امنیت پروتکل های مسیریابی در شبکه های اقتضایی
Posted by blogger at 1:06 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2017 (11)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2016 (2)
    • ►  April (1)
    • ►  February (1)
  • ►  2014 (7)
    • ►  November (5)
    • ►  September (1)
    • ►  March (1)
  • ►  2013 (7)
    • ►  August (1)
    • ►  July (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (16)
    • ►  November (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (3)
    • ►  May (2)
    • ►  March (2)
    • ►  February (2)
  • ▼  2011 (54)
    • ►  December (3)
    • ►  October (2)
    • ►  September (6)
    • ►  August (3)
    • ►  July (1)
    • ►  June (2)
    • ▼  May (21)
      • آموزشگاه موسیقی
      • Best Golf Bags For Sale
      • Mahshid Farhat (مهشید فرحت)
      • Security Improvement of Ad-hoc Networks Routing Pr...
      • Game-theoretic approach to mitigate packet droppin...
      • Risk of attack coefficient effect on availability ...
      • Game-Theoretic Approach in Network Security, Avail...
      • انجمن رمز ایران
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • S B I S C @ S U T
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • Workshop on Design and Cryptanalysis of eVoting Pr...
      • شاخه دانشجویی انجمن رمز - کارگاه دانشگاه شریف
      • Workshop on Cryptography and Information Theoretic...
      • Workshop on Integer Factorization
      • Workshop on Information Hiding Systems
      • Workshop on A5/1 Algorithm Cryptanalysis
      • کارگاه علمی طراحی و تحلیل پروتکل های رای گیری الکت...
      • مقدمه ای بر امنیت شبکه های متحرک بی سیم اقتضایی
      • Design and Cryptanalysis of E-Voting Protocols Wor...
    • ►  April (5)
    • ►  March (1)
    • ►  February (1)
    • ►  January (9)
  • ►  2010 (52)
    • ►  December (4)
    • ►  November (8)
    • ►  October (7)
    • ►  September (8)
    • ►  August (20)
    • ►  April (4)
    • ►  January (1)
  • ►  2009 (11)
    • ►  November (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (11)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2007 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (3)
  • ►  2006 (25)
    • ►  December (1)
    • ►  November (2)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (5)
    • ►  April (3)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2005 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)

My Blog List

  • کودکان خیال
    انتروپی پوچ - گر دورم ز تو باور مکن که زاید فاصله ها انتروپی متقابلمان گر غروب من طلوع تو باشد باور مکن که روی ز خاطرمان بدان که هست همواره مشغولیتی در پس زمینه این ذهنم...
    10 years ago

Farshid Farhat

Loading...

Loading...

BIG DATA Computation

Loading...

Loading...

Deep Learning

Loading...

Loading...

Computer Vision and Pattern Recognition

Loading...