مقالات Journal of Computing and Security، دوره 3، شماره 41.Persian Texts Part of Speech Tagging Using Artificial Neural Networks FullText2.Randomized SVD Based Probabilistic Caching Strategy in Named Data Networks FullText3.Multicollision Attack on a recently proposed hash function vMDC-۲ FullText4.On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol FullTextpublish: 2 January 2022 - view: 133 Archive of year 1401 Journal of Computing and SecurityVolume: 9Issue: 2Volume: 9Issue: 1Archive of year 1400 Journal of Computing and SecurityVolume: 8Issue: 2Volume: 8Issue: 1Archive of year 1399 Journal of Computing and SecurityVolume: 7Issue: 1Volume: 7Issue: 2Archive of year 1398 Journal of Computing and SecurityVolume: 6Issue: 1Volume: 6Issue: 2Archive of year 1397 Journal of Computing and SecurityVolume: 5Issue: 1Volume: 5Issue: 2Archive of year 1396 Journal of Computing and SecurityVolume: 4Issue: 2Volume: 4Issue: 1Archive of year 1395 Journal of Computing and SecurityVolume: 3Issue: 4Volume: 3Issue: 3Volume: 3Issue: 2Volume: 3Issue: 1Archive of year 1394 Journal of Computing and SecurityVolume: 2Issue: 4Volume: 2Issue: 3Volume: 2Issue: 2Volume: 2Issue: 1Archive of year 1393 Journal of Computing and SecurityVolume: 1Issue: 4Volume: 1Issue: 3Volume: 1Issue: 2Volume: 1Issue: 1