نتایج جستجو برای: theoretical methods
تعداد نتایج: 2122518 فیلتر نتایج به سال:
پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان
1389
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Journal:
:Notre Dame Journal of Formal Logic
1978
Journal:
:Journal of Complexity
2003
Journal:
:Laser and Particle Beams
2003
Journal:
:The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science
1893
Journal:
:Computational Biology and Bioinformatics
2017
Journal:
:Bulletin of the American Mathematical Society
1990
Journal:
:Advanced Quantum Technologies
2020
Journal:
:Journal of Chemical Education
2002
Journal:
:Scientific Journal of Public and Private Law
2020
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید