Works matching IS 17518709 AND DT 2017 AND VI 11 AND IP 6
Results: 12
Security assessment of the Spanish contactless identity card.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 386, doi. 10.1049/iet-ifs.2017.0299
- By:
- Publication type:
- Article
Impossible differential attacks on the SKINNY family of block ciphers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 377, doi. 10.1049/iet-ifs.2016.0488
- By:
- Publication type:
- Article
Enhanced secure time synchronisation protocol for IEEE802.15.4e‐based industrial Internet of Things.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 369, doi. 10.1049/iet-ifs.2016.0232
- By:
- Publication type:
- Article
Internal state recovery of Grain v1 employing guess‐and‐determine attack.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 363, doi. 10.1049/iet-ifs.2017.0232
- By:
- Publication type:
- Article
Implementation flaws in the masking scheme of DPA Contest v4.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 356, doi. 10.1049/iet-ifs.2016.0475
- By:
- Publication type:
- Article
MNOS: a mimic network operating system for software defined networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 345, doi. 10.1049/iet-ifs.2017.0085
- By:
- Publication type:
- Article
Memory attestation of wireless sensor nodes through trusted remote agents.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 338, doi. 10.1049/iet-ifs.2016.0556
- By:
- Publication type:
- Article
Attribute‐based encryption implies identity‐based encryption.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 332, doi. 10.1049/iet-ifs.2016.0490
- By:
- Publication type:
- Article
Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 326, doi. 10.1049/iet-ifs.2017.0111
- By:
- Publication type:
- Article
Defending shilling attacks in recommender systems using soft co‐clustering.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 319, doi. 10.1049/iet-ifs.2016.0345
- By:
- Publication type:
- Article
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 312, doi. 10.1049/iet-ifs.2016.0203
- By:
- Publication type:
- Article
Low‐latency digit‐serial dual basis multiplier for lightweight cryptosystems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 301, doi. 10.1049/iet-ifs.2015.0336
- By:
- Publication type:
- Article