Works matching IS 17518709 AND DT 2013 AND VI 7 AND IP 3
Results: 12
Strong non‐repudiation based on certificateless short signatures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 253, doi. 10.1049/iet-ifs.2012.0134
- By:
- Publication type:
- Article
Robust elliptic curve cryptography‐based three factor user authentication providing privacy of biometric data.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 247, doi. 10.1049/iet-ifs.2011.0348
- By:
- Publication type:
- Article
Publicly verifiable multi‐secret sharing scheme from bilinear pairings.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 239, doi. 10.1049/iet-ifs.2012.0105
- By:
- Publication type:
- Article
Superpoly algebraic normal form monomial test on Trivium.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 230, doi. 10.1049/iet-ifs.2012.0175
- By:
- Publication type:
- Article
Channel level crossing‐based security for communications over fading channels.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 221, doi. 10.1049/iet-ifs.2011.0360
- By:
- Publication type:
- Article
Security and complexity of the McEliece cryptosystem based on quasi‐cyclic low‐density parity‐check codes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 212, doi. 10.1049/iet-ifs.2012.0127
- By:
- Publication type:
- Article
TEAP: trust‐enhanced anonymous on‐demand routing protocol for mobile ad hoc networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 203, doi. 10.1049/iet-ifs.2012.0141
- By:
- Publication type:
- Article
BLAST: B‐LAyered bad‐character SHIFT tables for high‐speed pattern matching.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 195, doi. 10.1049/iet-ifs.2011.0305
- By:
- Publication type:
- Article
Enhanced digital rights management authentication scheme based on smart card.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 189, doi. 10.1049/iet-ifs.2012.0191
- By:
- Publication type:
- Article
New multivariate hash function quadratic polynomials multiplying linear polynomials.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 181, doi. 10.1049/iet-ifs.2012.0035
- By:
- Publication type:
- Article
Aryabhata remainder theorem‐based non‐iterative electronic lottery mechanism with robustness.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 172, doi. 10.1049/iet-ifs.2011.0327
- By:
- Publication type:
- Article
On the generalisation of special moduli for faster interleaved montgomery modular multiplication.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 165, doi. 10.1049/iet-ifs.2010.0271
- By:
- Publication type:
- Article