1.

Expected Coverage of Perfect Chains in the Hellman Time Memory Trade-Off

صفحه 155-162
Naser Hossein Gharavi؛ Abdorasool Mirghadri؛ Mohammad Abdollahi Azgomi؛ Sayyed Ahmad Mousavi

2.

Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

صفحه 163-174
Fereidoun Moradi؛ Hamid Mala؛ Behrouz Tork Ladani؛ Fariba Moradi

3.

A New Hybrid Method for VoIP Stream Steganography

صفحه 175-182
Hossein Moodi؛ Ahmad Reza Naghsh-Nilchi

4.

Effect of Purposeful Feature Extraction in High-dimensional Kinship Verification Problem

صفحه 183-191
Pendar Alirezazadeh؛ Abdolhossein Fathi؛ Fardin Abdali-Mohammadi


سامانه مدیریت نشریات علمی. قدرت گرفته از سیناوب