مقالات Journal of Computing and Security، دوره 1، شماره 11.An Optimal Traffic Distribution Method Supporting End-to-End Delay Bound FullText2.A Growing Hierarchical Approach to Batch Linear Manifold Topographic Map Formation FullText3.The Effect of Correlogram Properties on Blind Steganalysis in JPEG Images FullText4.An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks FullText5.Unified Byte Permutations for the Block Cipher ۳D FullText6.A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing FullTextpublish: 29 December 2021 - view: 116 Archive of year 1401 Journal of Computing and SecurityVolume: 9Issue: 2Volume: 9Issue: 1Archive of year 1400 Journal of Computing and SecurityVolume: 8Issue: 2Volume: 8Issue: 1Archive of year 1399 Journal of Computing and SecurityVolume: 7Issue: 1Volume: 7Issue: 2Archive of year 1398 Journal of Computing and SecurityVolume: 6Issue: 1Volume: 6Issue: 2Archive of year 1397 Journal of Computing and SecurityVolume: 5Issue: 1Volume: 5Issue: 2Archive of year 1396 Journal of Computing and SecurityVolume: 4Issue: 2Volume: 4Issue: 1Archive of year 1395 Journal of Computing and SecurityVolume: 3Issue: 4Volume: 3Issue: 3Volume: 3Issue: 2Volume: 3Issue: 1Archive of year 1394 Journal of Computing and SecurityVolume: 2Issue: 4Volume: 2Issue: 3Volume: 2Issue: 2Volume: 2Issue: 1Archive of year 1393 Journal of Computing and SecurityVolume: 1Issue: 4Volume: 1Issue: 3Volume: 1Issue: 2Volume: 1Issue: 1