نتایج جستجو برای: numerical methods
تعداد نتایج: 2143855 فیلتر نتایج به سال:
Journal:
:Proceedings of the National Academy of Sciences
1955
پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان
1389
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Journal:
:Computing and Visualization in Science
2018
Journal:
:Journal of Computational and Applied Mathematics
1986
Journal:
:Georisk: Assessment and Management of Risk for Engineered Systems and Geohazards
2017
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید