نتایج جستجو برای: searching methods
تعداد نتایج: 1914395 فیلتر نتایج به سال:
پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان
1389
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Journal:
:College & Research Libraries News
2020
Journal:
:Journal of Symbolic Computation
1989
Journal:
:Proceedings of the International Astronomical Union
2013
Journal:
:IEEE Access
2020
Journal:
:International Journal of Computer Network and Information Security
2011
Journal:
:Information Processing Letters
1981
Journal:
:Genetic Epidemiology
1999
Journal:
:Journal of Family Medicine and Primary Care
2017
Journal:
:Journal of Information Processing and Management
1989
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید