مقالات Journal of Computing and Security، دوره 2، شماره 2
3.A New Implementation for a ۲^n-۱ Modular Adder Through Carbon Nanotube Field Effect Transistors FullText
5.Robust Cooperative Spectrum Sensing under Primary User Emulation Attack in Cognitive Radio Networks FullText
6.Privacy-Preserving Fine-grained Correctness Verification of Query Results in Outsourced Databases FullText
publish: 2 January 2022 - view: 169