Papers of School of Mathematics

  • Papers in Journals:
  • List of Papers
  • Papers Published
  • Papers to Appear
  • Refereed Papers in:
  • Proceedings
  • Handbooks
  • Books (Collected Articles)
  • Search for Papers
  • List of all Papers

  • Pages: 1 2 3 4

      [Search Papers] [Print this List]
    1. S. Beigi, O. Etesami and A. Gohari,
    The value of information-theoretic content of help bits for computation,
    DOI: 10.1109/IWCIT.2015.7140205 Iran Workshop on Communication and Information Theory (IWCIT)

    IEEE publisher
    1-3
    (2015) 
    [abstract]   
     
    2. S. Beigi, O. Etesami and A. Gohari,
    Deterministic randomness extraction from generalized and distributed Santha-Vazirani sources,
    ICALP 2015


    143-154
    (2015) 
    [abstract]   
     
    3. A. Mohammadian and B. Tayfeh-Rezaie,
    A note on order and eigenvalue multiplicity of strongly regular graphs,
    Algebraic Design Theory and Hadamard Matrices
    Charles Colbourn

    209-212
    (2015) 
    [abstract]   
     
    4. R. Rezaeian Farashahi (Joint with B. rashidi and S. M. Sayedi),
    High-speed and pipelined finite field bit-parallel multiplier over GF(2m) for elliptic curve cryptosystems,
    ISCISC, 2014



    (2014) 
    [abstract]   
     
    5. Sh. Heidarkhani,
    Three solutions for systems of n fourth order partial differential equations,
    DOI 10.1007/978-1-4614-7333-6 35 Proceeding of International Conference on Differential & Difference Equations and Applications
    S. Pinelas
    Springer
    411-419
    (2013) 
    [abstract]   
     
    6. S. Salehipourmehr ,
    Computation in Logic and Logic in Computation,
    Proceedings of the Third International Conference on Contemporary Issues in Computer and Information Sciences


    580-583
    (2012) 
    [abstract]   
     
    7. M. S. Fallah (Joint with B. Sattarzadeh),
    Is cryptic able to detect insider attacks?,
    LNCS


    230-244
    (2011) 
    [abstract]   
     
    8. M. S. Fallah (Joint with A. Afshar),
    Reconstructing security types for automated policy enforcement in FABLE,
    International Conference on Network and System Security
    IEEE Computer Society Press

    358-363
    (2011) 
    [abstract]   
     
    9. S. Azam (Joint with H. Yamane and M. Yousofzadeh),
    Exposition on affine and elliptic root systems and elliptic Lie algebras,
    The Proceedings of New developments in group representation theory and noncommutative harmonic analysis



    (2011) 
    [abstract]   
     
    10. M. S. Fallah (Joint with A. Noorollahi),
    A logical view of nonmonotonicity in access control,
    Poceedings of the International Wrokshop on Model-Based and Policy-Based Engineering in Information Security



    (2011) 
    [abstract]   
     

    back to top

    Pages : 1 2 3 4  

    footer
     

    webmaster | ipmic@ipm.ir   Copyright © 2012, All rights reserved.