Works matching IS 17518709 AND DT 2018 AND VI 12 AND IP 1
Results: 13
Efficient approximate message authentication scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 100, doi. 10.1049/iet-ifs.2016.0256
- By:
- Publication type:
- Article
Outsourcing secret sharing scheme based on homomorphism encryption.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 94, doi. 10.1049/iet-ifs.2017.0026
- By:
- Publication type:
- Article
Security evaluation on Simeck against zero‐correlation linear cryptanalysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 87, doi. 10.1049/iet-ifs.2016.0503
- By:
- Publication type:
- Article
Group key exchange protocols withstanding ephemeral‐key reveals.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 79, doi. 10.1049/iet-ifs.2017.0131
- By:
- Publication type:
- Article
Cryptanalysis of a generic one‐round key exchange protocol with strong security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 71, doi. 10.1049/iet-ifs.2017.0055
- By:
- Publication type:
- Article
Mining malicious behavioural patterns.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 60, doi. 10.1049/iet-ifs.2017.0079
- By:
- Publication type:
- Article
Attribute‐based broadcast encryption scheme for lightweight devices.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 52, doi. 10.1049/iet-ifs.2017.0157
- By:
- Publication type:
- Article
Database authentication watermarking scheme in encrypted domain.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 42, doi. 10.1049/iet-ifs.2017.0092
- By:
- Publication type:
- Article
A provably secure code‐based concurrent signature scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 34, doi. 10.1049/iet-ifs.2017.0023
- By:
- Publication type:
- Article
Securing RSA against power analysis attacks through non‐uniform exponent partitioning with randomisation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 25, doi. 10.1049/iet-ifs.2016.0508
- By:
- Publication type:
- Article
Privacy preserving big data mining: association rule hiding using fuzzy logic approach.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 15, doi. 10.1049/iet-ifs.2015.0545
- By:
- Publication type:
- Article
Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 7, doi. 10.1049/iet-ifs.2017.0038
- By:
- Publication type:
- Article
Implementation of single‐packet hybrid IP traceback for IPv4 and IPv6 networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 1, doi. 10.1049/iet-ifs.2015.0483
- By:
- Publication type:
- Article