>
Fa
  |  
Ar
  |  
En
  
journal of computing and security
  
سال:2014 - دوره:1 - شماره:1
  
 
AGrowing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation
- صفحه:47-59
  
 
ATrust-Based Approach for Correctness verification of Query Results in Data Outsourcing
- صفحه:3-14
  
 
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks
- صفحه:23-38
  
 
An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound
- صفحه:61-71
  
 
The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images
- صفحه:39-46
  
 
Unified Byte Permutations for the Block Cipher 3D
- صفحه:15-22
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved