>
Fa
  |  
Ar
  |  
En
  
journal of computing and security
  
سال:2016 - دوره:3 - شماره:3
  
 
A New Hybrid Method for VoIP Stream Steganography
- صفحه:175-182
  
 
Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem
- صفحه:183-191
  
 
Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off
- صفحه:155-162
  
 
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
- صفحه:163-174
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved