Works matching IS 17518709 AND DT 2013 AND VI 7 AND IP 4
Results: 12
Systemic threats to hypervisor non‐control data.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 349, doi. 10.1049/iet-ifs.2012.0252
- By:
- Publication type:
- Article
Traceable, group‐oriented, signature scheme with multiple signing policies in group‐based trust management.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 343, doi. 10.1049/iet-ifs.2012.0350
- By:
- Publication type:
- Article
Survey of data aggregation techniques using soft computing in wireless sensor networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 336, doi. 10.1049/iet-ifs.2012.0292
- By:
- Publication type:
- Article
Hardware acceleration of regular expression repetitions in deep packet inspection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 327, doi. 10.1049/iet-ifs.2012.0340
- By:
- Publication type:
- Article
An adaptive distributed certificate management scheme for space information network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 318, doi. 10.1049/iet-ifs.2012.0253
- By:
- Publication type:
- Article
Polynomial differential‐based strong (n, t, n)‐verifiable secret sharing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 312, doi. 10.1049/iet-ifs.2012.0366
- By:
- Publication type:
- Article
Scalable fragile watermarking for image authentication.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 300, doi. 10.1049/iet-ifs.2010.0059
- By:
- Publication type:
- Article
Chosen‐plaintext linear attacks on Serpent.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 293, doi. 10.1049/iet-ifs.2012.0287
- By:
- Publication type:
- Article
JITSafe: a framework against Just‐in‐time spraying attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 283, doi. 10.1049/iet-ifs.2012.0142
- By:
- Publication type:
- Article
Link quality‐based cache replacement technique in mobile ad hoc network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 277, doi. 10.1049/iet-ifs.2012.0244
- By:
- Publication type:
- Article
New certificateless public key encryption scheme without pairing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 271, doi. 10.1049/iet-ifs.2012.0257
- By:
- Publication type:
- Article
Colour image encryption based on advanced encryption standard algorithm with two‐dimensional chaotic map.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 265, doi. 10.1049/iet-ifs.2012.0304
- By:
- Publication type:
- Article