-
1
المؤلفون: Ali Miri, Hoi Ting Poon
المصدر: IEEE Transactions on Cloud Computing. 7:1002-1012
مصطلحات موضوعية: Information privacy, Information retrieval, Computer Networks and Communications, Computer science, business.industry, 020206 networking & telecommunications, Cryptography, Cloud computing, 02 engineering and technology, Bloom filter, Phrase search, Encryption, Computer Science Applications, Hardware and Architecture, Server, 0202 electrical engineering, electronic engineering, information engineering, business, Cloud storage, Software, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::bd496136eec0e910e0d186c11bab1dc1Test
https://doi.org/10.1109/tcc.2017.2709316Test -
2
المؤلفون: Ali Miri, Sarah Asiri
المصدر: PST
مصطلحات موضوعية: Distributed Computing Environment, Artificial neural network, Computer science, business.industry, media_common.quotation_subject, Distributed computing, Probabilistic logic, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Recommender system, Computer security, computer.software_genre, Data modeling, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Single point of failure, business, computer, Reputation, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::131e033af8e9ca17ee337f11ca293a18Test
https://doi.org/10.1109/pst.2016.7907017Test -
3
المؤلفون: Ali Miri, Mohammad Davarpanah Jazi, Fatemeh Raji
المصدر: Computers & Electrical Engineering. 39:2282-2298
مصطلحات موضوعية: Information privacy, General Computer Science, Privacy by Design, Privacy software, Computer science, business.industry, InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, Information sharing, Internet privacy, Cryptography, Computer security, computer.software_genre, Data sharing, Control and Systems Engineering, Electrical and Electronic Engineering, business, Personally identifiable information, Broadcast encryption, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::9d4e2e7de2764f815d2145e898e8f912Test
https://doi.org/10.1016/j.compeleceng.2012.09.002Test -
4
المؤلفون: J. A. Lima, Monica Nevins, Ali Miri
المصدر: IEEE Latin America Transactions. 10:1274-1282
مصطلحات موضوعية: Engineering, General Computer Science, business.industry, Cryptography, Access control, Interference (wave propagation), Computer security, computer.software_genre, WiMAX, law.invention, Relay attack, Relay, law, Bit error rate, Radio-frequency identification, Electrical and Electronic Engineering, business, computer, Computer network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::830bb14152614a76e754af19bc840ef0Test
https://doi.org/10.1109/tla.2012.6142473Test -
5
المؤلفون: Ali Miri, Deholo Nali, Carlisle Adams
المصدر: International Journal of Information Security. 5:92-104
مصطلحات موضوعية: Scheme (programming language), Computer Networks and Communications, business.industry, Computer science, Cryptography, Bidding, Encryption, Computer security, computer.software_genre, Software, Forward secrecy, Confidentiality, Stock market, Safety, Risk, Reliability and Quality, business, computer, Information Systems, computer.programming_language
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::562a356b5e525b39dd78586b7d62b3a7Test
https://doi.org/10.1007/s10207-006-0084-5Test -
6كتاب إلكتروني
المؤلفون: Ali Miri, Serge Vaudenay
نوع المادة: eBook.
الموضوعات: Cryptography, Data encryption (Computer science), Data protection, Algorithms, Computer networks, Application software, Image processing—Digital techniques, Computer vision
تصنيفات: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Image Processing, COMPUTERS / Artificial Intelligence / Computer Vision & Pattern Recognition, COMPUTERS / Networking / General, COMPUTERS / Programming / Algorithms, COMPUTERS / Security / General
-
7
المصدر: ICC
مصطلحات موضوعية: Nonlinear Sciences::Chaotic Dynamics, Theoretical computer science, Probabilistic encryption, business.industry, Computer science, Chaotic, Chaotic map, Cryptography, Substitution method, Encryption, business, Algorithm
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::84f2379eb3fac5b4757031267826050cTest
https://doi.org/10.1109/icc.2012.6363965Test -
8
المؤلفون: Fatemeh Raji, Behzad Malek, Mohammad Davarpanah Jazi, Ali Miri
المصدر: 2011 CSI International Symposium on Computer Science and Software Engineering (CSSE).
مصطلحات موضوعية: Information privacy, business.industry, Computer science, InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, Privacy policy, Information sharing, Internet privacy, Authorization, Cryptography, Access control, Trusted third party, Encryption, Computer security, computer.software_genre, business, computer, Broadcast encryption
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::a71c251f1793ce79ce7aaa2a3be9980bTest
https://doi.org/10.1109/csicsse.2011.5963982Test -
9
المؤلفون: Ali Miri, Saeed Samet
المصدر: CISDA
مصطلحات موضوعية: Information privacy, Association rule learning, Computer science, business.industry, Business system planning, Cryptography, Computer security, computer.software_genre, Information sensitivity, Cardinality, Raw data, business, computer, Protocol (object-oriented programming)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::ae62a61b62a9d9803d333557d561f876Test
https://doi.org/10.1109/cisda.2009.5356544Test -
10
المؤلفون: Ali Miri, Behzad Malek
المصدر: CSE (3)
مصطلحات موضوعية: Information privacy, Computer access control, business.industry, Computer science, Authorization, Cryptography, Access control, Computer security, computer.software_genre, Encryption, Discretionary access control, System administrator, Role-based access control, Physical access, Attribute-based encryption, business, computer, Access structure
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::2f56343f19789faafc6c170000d70692Test
https://doi.org/10.1109/cse.2009.157Test