300 THE MOVIE (Three Hundred)

The film is directed by Zack Snyder from the graphic novel 300 by Frank Miller about the Battle of Thermopylae

Monday, August 23, 2010

Sharif Security and Cryptography

Farshid Farhat 's Assistantship Homepage

  • images/farshid.farhat.frash.logo.ico
  • Cryptography Fundamentals
    • cryptfund/7.pdf
  • Cryptography Mathematics
    • cryptmath/1.pdf
    • cryptmath/2.pdf
    • نمرات تمرینات درس ریاضیات رمزنگاری
  • Advanced Cryptography
    • Serpent
  • Data Communication Networks
    • datanet/no1.pdf
  • Network Security
    • طراحی شبکه ها و اصول لایه بندی
    • Cryptography
    • NetSec
    • PKI and Certificate Authority
    • Kerberos
    • Email Security
  • links.htm
  • Contents
  • images/frash.jpg
Posted by blogger at 11:41 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2020 (1)
    • ►  March (1)
  • ►  2018 (2)
    • ►  November (2)
  • ►  2017 (11)
    • ►  October (3)
    • ►  September (2)
    • ►  August (2)
    • ►  July (3)
    • ►  May (1)
  • ►  2015 (1)
    • ►  March (1)
  • ►  2014 (3)
    • ►  November (2)
    • ►  September (1)
  • ►  2013 (4)
    • ►  April (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (7)
    • ►  November (2)
    • ►  September (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (2)
  • ►  2011 (15)
    • ►  October (1)
    • ►  September (1)
    • ►  May (7)
    • ►  April (1)
    • ►  January (5)
  • ▼  2010 (21)
    • ►  November (3)
    • ►  October (3)
    • ►  September (7)
    • ▼  August (8)
      • Sharif Security and Cryptography
      • Security & Cryptology at Sharif University
      • Steganalysis using eigenvalues
      • Wireless Mobile Adhoc Network Security Simulator
      • Optical-CDMA Network Simulator (OCNS)
      • Student Branch of Iranian Society of Cryptology
      • Game Theory Network Simulator
      • Game-Theoretic Network Simulator (GTNS)
  • ►  2009 (3)
    • ►  November (3)
  • ►  2007 (4)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
    • ►  January (1)

My Blog List

  • Absolute Security
    System and methods for UICC-based secure communication - ABSTRACT A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform o...
    5 years ago
  • Apple iPhone .ir
    New trend in Computational Photography - CAPTAIN: Comprehensive Composition Assistance for Photo TakingAuction-based Resource Management in Computer ArchitectureProfessional portrait datasetEnhanc...
    6 years ago
  • The Dawn of Darkness
    Latest research done by November 2017 - CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment Behavioral Analog Topology Synthesizer Optical CDMA Network Simulator (...
    7 years ago

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...
Powered by Blogger.