>
Fa
  |  
Ar
  |  
En
  
The Isc International Journal Of Information Security
  
سال:2016 - دوره:8 - شماره:1
  
 
A New Method For Accelerating Impossible Differential Cryptanalysis And Its Application On Lblock
- صفحه:73-84
  
 
A Short Introduction To Two Approaches In Formal Verification Of Security Protocols: Model Checking And Theorem Proving
- صفحه:3-24
  
 
Aggrandizing The Beast'S Limbs: Patulous Code Reuse Attack On Arm Architecture
- صفحه:39-52
  
 
Editorial
- صفحه:1-2
  
 
On The Design And Security Of A Lattice-Based Threshold Secret Sharing Scheme
- صفحه:25-38
  
 
Self Authentication Path Insertion In Fpga-Based Design Flow For Tamper-Resistant Purpose
- صفحه:53-60
  
 
Unauthenticated Event Detection In Wireless Sensor Networks Using Sensors Co-Coverage
- صفحه:61-71
Copyright 2023
Islamic World Science Citation Center
All Rights Reserved