Works matching IS 17518709 AND DT 2013 AND VI 7 AND IP 2
Results: 12
Oblivious decision program evaluation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 155, doi. 10.1049/iet-ifs.2012.0032
- By:
- Publication type:
- Article
uCloud: a user‐centric key management scheme for cloud data protection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 144, doi. 10.1049/iet-ifs.2012.0198
- By:
- Publication type:
- Article
On the approximation of S‐boxes via Maiorana–McFarland functions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 134, doi. 10.1049/iet-ifs.2012.0169
- By:
- Publication type:
- Article
Antivirus performance characterisation: system‐wide view.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 126, doi. 10.1049/iet-ifs.2012.0192
- By:
- Publication type:
- Article
Secure remote access to home automation networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 118, doi. 10.1049/iet-ifs.2011.0303
- By:
- Publication type:
- Article
New certificateless short signature scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 113, doi. 10.1049/iet-ifs.2012.0176
- By:
- Publication type:
- Article
Fair (t, n) threshold secret sharing scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 106, doi. 10.1049/iet-ifs.2012.0064
- By:
- Publication type:
- Article
IDSEP: a novel intrusion detection scheme based on energy prediction in cluster‐based wireless sensor networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 97, doi. 10.1049/iet-ifs.2012.0052
- By:
- Publication type:
- Article
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 87, doi. 10.1049/iet-ifs.2012.0104
- By:
- Publication type:
- Article
Low space‐complexity digit‐serial dual basis systolic multiplier over Galois field GF(2<sup>m</sup>) using Hankel matrix and Karatsuba algorithm.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 75, doi. 10.1049/iet-ifs.2012.0227
- By:
- Publication type:
- Article
Use of elliptic curve cryptography for multimedia encryption.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 67, doi. 10.1049/iet-ifs.2012.0147
- By:
- Publication type:
- Article
Secure group communication with both confidentiality and non‐repudiation for mobile ad‐hoc networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 2, p. 61, doi. 10.1049/iet-ifs.2010.0314
- By:
- Publication type:
- Article