Works about PUBLIC key cryptography
1
- VLDB Journal International Journal on Very Large Data Bases, 2024, v. 33, n. 1, p. 185, doi. 10.1007/s00778-023-00803-2
- Shaham, Sina;
- Ghinita, Gabriel;
- Shahabi, Cyrus
- Article
2
- Fluctuation & Noise Letters, 2013, v. 12, n. 3, p. -1, doi. 10.1142/S0219477513500181
- KISH, LASZLO B.;
- KWAN, CHIMAN
- Article
3
- Journal of Application Business & Management / Jurnal Aplikasi Bisnis dan Manajemen, 2023, v. 9, n. 2, p. 440, doi. 10.17358/jabm.9.2.440
- Ambarwati, Sri;
- Sudarmaji, Eka
- Article
4
- Journal of Fuzzy Extension & Applications (JFEA), 2024, v. 5, n. 1, p. 69, doi. 10.22105/jfea.2024.423818.1321
- Abobala, Mohammad;
- Sankari, Hasan;
- Zeina, Mohamed Bisher
- Article
5
- IET Intelligent Transport Systems (Wiley-Blackwell), 2020, v. 14, n. 11, p. 1456, doi. 10.1049/iet-its.2019.0855
- Saračević, Muzafer;
- Adamović, Saša;
- Maček, Nemanja;
- Elhoseny, Mohamed;
- Sarhan, Shahenda
- Article
6
- IET Intelligent Transport Systems (Wiley-Blackwell), 2019, v. 13, n. 9, p. 1447, doi. 10.1049/iet-its.2018.5474
- Kanchan, Sneha;
- Singh, Garima;
- Chaudhari, Narendra S.
- Article
7
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 681, doi. 10.1049/ise2.12124
- Reno, Saha;
- Haque, Md. Mokammel
- Article
8
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 458, doi. 10.1049/ise2.12109
- Shiraya, Takuro;
- Takeuchi, Nobuyuki;
- Sakamoto, Kosei;
- Isobe, Takanori
- Article
9
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 227, doi. 10.1049/ise2.12101
- Wang, Anyu;
- Xiao, Dianyan;
- Yu, Yang
- Article
10
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 2, p. 210, doi. 10.1049/ise2.12092
- Ikematsu, Yasuhiko;
- Nakamura, Shuhei;
- Takagi, Tsuyoshi
- Article
11
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 18, doi. 10.1049/ise2.12089
- Farzaliyev, Valeh;
- Willemson, Jan;
- Kaasik, Jaan Kristjan
- Article
12
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 301, doi. 10.1049/ise2.12062
- Article
13
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 111, doi. 10.1049/ise2.12049
- Liu, Zi‐Yuan;
- Tseng, Yi‐Fan;
- Tso, Raylin;
- Mambo, Masahiro;
- Chen, Yu‐Chi
- Article
14
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 443, doi. 10.1049/iet-ifs.2019.0559
- Feng, Qi;
- He, Debiao;
- Liu, Zhe;
- Wang, Ding;
- Choo, Kim‐Kwang Raymond
- Article
15
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 342, doi. 10.1049/iet-ifs.2018.5246
- Wang, Xuyang;
- Hu, Aiqun;
- Fang, Hao
- Article
16
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 313, doi. 10.1049/iet-ifs.2019.0214
- Liu, Zhen;
- Pan, Yanbin;
- Xie, Tianyuan
- Article
17
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 304, doi. 10.1049/iet-ifs.2019.0420
- Santini, Paolo;
- Baldi, Marco;
- Chiaraluce, Franco
- Article
18
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 3, p. 286, doi. 10.1049/iet-ifs.2019.0220
- Le, Huy Quoc;
- Mishra, Pradeep Kumar;
- Nakamura, Satoshi;
- Kinjo, Koha;
- Duong, Dung Hoang;
- Yasuda, Masaya
- Article
19
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 2, p. 232, doi. 10.1049/iet-ifs.2019.0027
- Wang, Ziwang;
- Zhuang, Yi;
- Xia, Qingxun
- Article
20
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 2, p. 196, doi. 10.1049/iet-ifs.2018.5288
- Duong, Dung Hoang;
- Van Luyen, Le;
- Tran, Ha Thanh Nguyen
- Article
21
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 111, doi. 10.1049/iet-ifs.2018.5448
- Article
22
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 99, doi. 10.1049/iet-ifs.2019.0249
- Li, Xuelian;
- Han, Yue;
- Gao, Juntao;
- Niu, Jie
- Article
23
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 21, doi. 10.1049/iet-ifs.2018.5443
- Gharsallah, Ikram;
- Smaoui, Salima;
- Zarai, Faouzi
- Article
24
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 639, doi. 10.1049/iet-ifs.2018.5427
- Luo, Fucai;
- Wang, Fuqun;
- Wang, Kunpeng;
- Chen, Kefei
- Article
25
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 614, doi. 10.1049/iet-ifs.2018.5361
- SubramanyaRao, SrinivasaRao;
- Hu, Zhi;
- Zhao, Chang‐An
- Article
26
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 498, doi. 10.1049/iet-ifs.2018.5082
- Nuñez, David;
- Agudo, Isaac;
- Lopez, Javier
- Article
27
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 404, doi. 10.1049/iet-ifs.2018.5207
- Baldi, Marco;
- Chiaraluce, Franco;
- Rosenthal, Joachim;
- Santini, Paolo;
- Schipani, Davide
- Article
28
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 362, doi. 10.1049/iet-ifs.2018.5307
- Conde Pena, Marta;
- Durán Díaz, Raul;
- Faugère, Jean‐Charles;
- Hernández Encinas, Luis;
- Perret, Ludovic
- Article
29
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 330, doi. 10.1049/iet-ifs.2018.5178
- Zhang, Xiaona;
- Wang, Li‐Ping;
- Xu, Jun
- Article
30
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 278, doi. 10.1049/iet-ifs.2018.5174
- Sheikhi‐Garjan, Maryam;
- Bahramian, Mojtaba;
- Doche, Christophe
- Article
31
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 231, doi. 10.1049/iet-ifs.2018.5191
- Parihar, Aashish;
- Nakhate, Sangeeta
- Article
32
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 223, doi. 10.1049/iet-ifs.2018.5336
- Sohail, Muhammad;
- Wang, Liangmin;
- Jiang, Shunrong;
- Zaineldeen, Samar;
- Ashraf, Rana Umair
- Article
33
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 498, doi. 10.1049/iet-ifs.2018.0041
- Article
34
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 375, doi. 10.1049/iet-ifs.2017.0107
- Ping, Yuan;
- Wang, Baocang;
- Tian, Shengli;
- Yang, Yuehua;
- Du, Genyuan
- Article
35
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 305, doi. 10.1049/iet-ifs.2017.0046
- Bai, Kunpeng;
- Wu, Chuankun;
- Zhang, Zhenfeng
- Article
36
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 275, doi. 10.1049/iet-ifs.2017.0030
- De los Santos, Sergio;
- Torres, José
- Article
37
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 2, p. 118, doi. 10.1049/iet-ifs.2016.0621
- Buchanan, William J.;
- Helme, Scott;
- Woodward, Alan
- Article
38
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 5, p. 256, doi. 10.1049/iet-ifs.2016.0261
- Zhou, Caixue;
- Cui, Zongmin
- Article
39
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 4, p. 195, doi. 10.1049/iet-ifs.2015.0119
- Chen, Binglong;
- Hu, Chuangqiang;
- Zhao, Chang‐An
- Article
40
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 131, doi. 10.1049/iet-ifs.2016.0150
- Wang, Huaqun;
- He, Debiao;
- Zhang, Shibing
- Article
41
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 16, doi. 10.1049/iet-ifs.2015.0438
- Bhutta, Muhammad Nasir Mumtaz;
- Cruickshank, Haitham;
- Sun, Zhili
- Article
42
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 1, p. 1, doi. 10.1049/iet-ifs.2014.0530
- Article
43
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 6, p. 304, doi. 10.1049/iet-ifs.2015.0507
- Heuer, Felix;
- Jager, Tibor;
- Schäge, Sven;
- Kiltz, Eike
- Article
44
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 5, p. 272, doi. 10.1049/iet-ifs.2015.0390
- Goutham Reddy, Alavalapati;
- Yoon, Eun‐Jun;
- Das, Ashok Kumar;
- Yoo, Kee‐Young
- Article
45
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 5, p. 245, doi. 10.1049/iet-ifs.2015.0399
- Chakraborty, Abhishek;
- Bhattacharya, Sarani;
- Dixit, Tanu Hari;
- Rebeiro, Chester;
- Mukhopadhyay, Debdeep
- Article
46
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 248, doi. 10.1049/iet-ifs.2014.0161
- Pakniat, Nasrollah;
- Noroozi, Mahnaz;
- Eslami, Ziba
- Article
47
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 234, doi. 10.1049/iet-ifs.2013.0558
- Tadayon, Mohammad Hesam;
- Khanmohammadi, Hadi;
- Sayad Haghighi, Mohammad
- Article
48
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 2, p. 119, doi. 10.1049/iet-ifs.2013.0286
- Vigila, Soosai Antony Maria Celestin;
- Muneeswaran, Karuppiah;
- Antony, William Thomas Berkin Albert
- Article
49
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 2, p. 91, doi. 10.1049/iet-ifs.2013.0215
- Kefallinos, Dionysis;
- Sykas, Efstathios
- Article
50
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 14, doi. 10.1049/iet-ifs.2013.0076
- Pushpa Lakshmi, R.;
- Vincent Antony Kumar, A.
- Article