>
Fa
  |  
Ar
  |  
En
  
The Isc International Journal Of Information Security
  
سال:2011 - دوره:3 - شماره:2
  
 
A Model For Specification, Composition And Verification Of Access Control Policies And Its Application Toweb Services
- صفحه:103-120
  
 
Alert Correlation And Prediction Using Data Mining And Hmm
- صفحه:77-101
  
 
Constructing Cryptographic Definitions
- صفحه:69-76
  
 
Editorial
- صفحه:67-67
  
 
Separating Indexes From Data:A Distributed Scheme For Secure Database Outsourcing
- صفحه:121-133
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved