• 3
  • 3

IPM - School of Mathematics

Papers of School of Mathematics

  • Papers in Journals:
  • List of Papers
  • Papers Published
  • Papers to Appear
  • Refereed Papers in:
  • Proceedings
  • Handbooks
  • Books (Collected Articles)
  • Search for Papers
  • List of all Papers

  • Pages: 1 2 3 4 5 6

      [Search Papers] [Print this List]
    21. M. Golshani (Joint with A. S. Daghighi, J. Hamkins, and E. Jerabek),
    The foundation axiom and elementary self-embeddings of the universe,
    23 Infinity, computability, and metamathematics: Festschrift celebrating the 60th birthdays of Peter Koepke and Philip Welch, S. Geschke, B. Löwe, and P. Schlicht
    Coll. Publ., London

    89-112
    (2014) 
    [abstract]   
     
    22. R. Rezaeian Farashahi (Joint with B. rashidi and S. M. Sayedi),
    High-speed and pipelined finite field bit-parallel multiplier over GF(2m) for elliptic curve cryptosystems,
    ISCISC, 2014



    (2014) 
    [abstract]   
     
    23. S. Beigi (Joint with A. Gohari),
    On dimension bounds for auxiliary quantum systems,
    Iran Workshop on Communication and Information Theory (IWCIT)


    1-6
    (2013) 
    [abstract]   
     
    24. S. Beigi (Joint with J. Chen, M. Grassl, Zh. Ji, Q. Wang, and B. Zeng),
    Symmetries of codeword stabilized quantum codes,
    8th Conference on the Theory of Quantum Computation


    192-206
    (2013) 
    [abstract]   
     
    25. Sh. Heidarkhani,
    Three solutions for systems of n fourth order partial differential equations,
    DOI 10.1007/978-1-4614-7333-6 35 Proceeding of International Conference on Differential & Difference Equations and Applications
    S. Pinelas
    Springer
    411-419
    (2013) 
    [abstract]   
     
    26. S. Salehi,
    Axiomatizing mathematical theories: Multiplication,
    Proceedings of Frontiers in Mathematical Sciences


    165-176
    (2012) 
    [abstract]   
     
    27. S. Salehi,
    Computation in logic and logic in computation,
    Proceedings of the Third International Conference on Contemporary Issues in Computer and Information Sciences 2012



    (2012) 
    [abstract]   
     
    28. M. S. Fallah (Joint with B. Sattarzadeh),
    Is cryptic able to detect insider attacks?,
    LNCS


    230-244
    (2011) 
    [abstract]   
     
    29. M. S. Fallah (Joint with A. Afshar),
    Reconstructing security types for automated policy enforcement in FABLE,
    International Conference on Network and System Security
    IEEE Computer Society Press

    358-363
    (2011) 
    [abstract]   
     
    30. S. Azam (Joint with H. Yamane and M. Yousofzadeh),
    Exposition on affine and elliptic root systems and elliptic Lie algebras,
    The Proceedings of New developments in group representation theory and noncommutative harmonic analysis



    (2011) 
    [abstract]   
     

    back to top

    Pages : 1 2 3 4 5 6