>
Fa
  |  
Ar
  |  
En
  
the isc international journal of information security
  
سال:2016 - دوره:8 - شماره:1
  
 
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
- صفحه:73-84
  
 
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
- صفحه:3-24
  
 
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
- صفحه:39-52
  
 
Editorial
- صفحه:1-2
  
 
On the design and security of a lattice-based threshold secret sharing scheme
- صفحه:25-38
  
 
Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
- صفحه:53-60
  
 
Unauthenticated event detection in wireless sensor networks using sensors co-coverage
- صفحه:61-71
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved