نتایج جستجو برای: theoretical methods

تعداد نتایج: 2122518  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Notre Dame Journal of Formal Logic 1978

Journal: :The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science 1893

Journal: :Bulletin of the American Mathematical Society 1990

Journal: :Scientific Journal of Public and Private Law 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید