Works matching IS 17518709 AND DT 2015 AND VI 9 AND IP 6
1
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 380, doi. 10.1049/iet-ifs.2014.0293
- Article
2
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 374, doi. 10.1049/iet-ifs.2014.0353
- Wang, Wei;
- He, Yongzhong;
- Liu, Jiqiang;
- Gombault, Sylvain
- Article
3
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 365, doi. 10.1049/iet-ifs.2014.0245
- Al‐Haj, Ali;
- Abandah, Gheith;
- Hussein, Noor
- Article
4
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 354, doi. 10.1049/iet-ifs.2014.0244
- Article
5
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 344, doi. 10.1049/iet-ifs.2014.0272
- Dai, Fangfang;
- Hu, Ying;
- Zheng, Kangfeng;
- Wu, Bin
- Article
6
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 334, doi. 10.1049/iet-ifs.2013.0170
- Khedr, Walid I.;
- Abdalla, Mahmoud I.;
- Elsheikh, Asmaa A.
- Article
7
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 328, doi. 10.1049/iet-ifs.2014.0540
- AlTawy, Riham;
- Youssef, Amr M.
- Article
8
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 321, doi. 10.1049/iet-ifs.2014.0424
- Shi, Zhenqing;
- Zhang, Bin;
- Feng, Dengguo
- Article
9
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 313, doi. 10.1049/iet-ifs.2014.0099
- Yerima, Suleiman Y.;
- Sezer, Sakir;
- Muttik, Igor
- Article
10
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 305, doi. 10.1049/iet-ifs.2014.0545
- Salah, Khaled;
- Chaudary, Aslam
- Article