机构作者

Ahmadian, Davood
文献数量:1

Ghassemzadeh, Saeid
文献数量:1

Kalejahi, Behnam Kiani
文献数量:1

Khalaj-Kondori, Mohammad
文献数量:1

Khodayi-Shahrak, Majid
文献数量:1

Mohammadi-Ivatloo, Behnam
文献数量:1

Parvini, Navid
文献数量:1

Razmara, Jafar
文献数量:1

Shahpasand, Siyamak
文献数量:1

Tabar, Vahid Sohrabi
文献数量:1

Tabrizchi, Hamed
文献数量:1

Tohidi, Sajjad
文献数量:1
机构文献
Tracing drugs from discovery to disposal[J]
DRUG DISCOVERY TODAY
Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)[J]
COMPUTER SYSTEMS SCIENCE AND ENGINEERING
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks[J]
PEER-TO-PEER NETWORKING AND APPLICATIONS