مقالات Journal of Computing and Security، دوره 6، شماره 11.An Extension of CryptoPAi to the Formal Analysis of E-voting Protocols FullText2.Full Secret Disclosure Attack against an EPC- C۱ G۲ Compliant Authentication Protocol FullText3.Identifying Explicit Features of Persian Comments FullTextpublish: 7 February 2021 - view: 259 Archive of year 1401 Journal of Computing and SecurityVolume: 9Issue: 2Volume: 9Issue: 1Archive of year 1400 Journal of Computing and SecurityVolume: 8Issue: 2Volume: 8Issue: 1Archive of year 1399 Journal of Computing and SecurityVolume: 7Issue: 1Volume: 7Issue: 2Archive of year 1398 Journal of Computing and SecurityVolume: 6Issue: 1Volume: 6Issue: 2Archive of year 1397 Journal of Computing and SecurityVolume: 5Issue: 1Volume: 5Issue: 2Archive of year 1396 Journal of Computing and SecurityVolume: 4Issue: 2Volume: 4Issue: 1Archive of year 1395 Journal of Computing and SecurityVolume: 3Issue: 4Volume: 3Issue: 3Volume: 3Issue: 2Volume: 3Issue: 1Archive of year 1394 Journal of Computing and SecurityVolume: 2Issue: 4Volume: 2Issue: 3Volume: 2Issue: 2Volume: 2Issue: 1Archive of year 1393 Journal of Computing and SecurityVolume: 1Issue: 4Volume: 1Issue: 3Volume: 1Issue: 2Volume: 1Issue: 1