نتایج جستجو برای: step methods

تعداد نتایج: 2084611  

Journal: :Computers & Mathematics with Applications 2010

Journal: :Journal of Computational and Applied Mathematics 2009

Journal: :SIAM Journal on Numerical Analysis 1994

Journal: :Computational & Applied Mathematics 2005

Journal: :Journal of Computational and Applied Mathematics 2017

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Computers & Mathematics with Applications 1986

Journal: :Laboratory Medicine 1998

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید