>
Fa
  |  
Ar
  |  
En
  
journal of computing and security
  
سال:2016 - دوره:3 - شماره:4
  
 
Multicollision Attack on a Recently Proposed Hash Function vMDC-2
- صفحه:211-215
  
 
On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol
- صفحه:201-209
  
 
Persian Texts Part of Speech Tagging Using Artificial Neural Networks
- صفحه:233-241
  
 
Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks
- صفحه:217-231
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved