>
Fa
  |  
Ar
  |  
En
  
the isc international journal of information security
  
سال:2015 - دوره:7 - شماره:2
  
 
A collusion mitigation scheme for reputation systems
- صفحه:151-166
  
 
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
- صفحه:91-99
  
 
Cryptanalysis of some first round CAESAR candidates
- صفحه:127-134
  
 
EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
- صفحه:115-126
  
 
Editorial
- صفحه:80-90
  
 
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields
- صفحه:101-114
  
 
Enhancing privacy of recent authentication schemes for low-cost RFID systems
- صفحه:135-149
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved