نتایج جستجو برای: s 1
تعداد نتایج: 3192607 فیلتر نتایج به سال:
Journal:
:Acta Chemica Scandinavica
1995
Journal:
:The Journal of Antibiotics
1974
Journal:
:Acta Crystallographica Section E Structure Reports Online
2012
2006
William Perkins
The protocol is, however, susceptible to a man-in-the-middle attack [3], in which the adversary (Eve) intercepts a message from Alice and creates a new message to send to Bob (Fig.1). Eve performs the exchange with Alice using the original message, while Bob performs the exchange using the newly created message. At the final stage, Eve has the original message in decrypted form, while Bob has t...
Journal:
:European Journal of Combinatorics
2015
Journal:
:Mathematical and Computer Modelling
1995
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید