Works matching IS 17518709 AND DT 2014 AND VI 8 AND IP 1
Results: 8
Review of gate‐level differential power analysis and fault analysis countermeasures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 51, doi. 10.1049/iet-ifs.2012.0319
- By:
- Publication type:
- Article
Manual and Automatic assigned thresholds in multi‐layer data fusion intrusion detection system for 802.11 attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 42, doi. 10.1049/iet-ifs.2012.0302
- By:
- Publication type:
- Article
Efficient t ‐cheater identifiable (k, n) secret‐sharing scheme for t ≤ ⌊((k − 2)/2)⌋.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 37, doi. 10.1049/iet-ifs.2012.0322
- By:
- Publication type:
- Article
Analysis of Bayesian classification‐based approaches for Android malware detection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 25, doi. 10.1049/iet-ifs.2013.0095
- By:
- Publication type:
- Article
Malware detection method based on the control‐flow construct feature of software.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 18, doi. 10.1049/iet-ifs.2012.0289
- By:
- Publication type:
- Article
A bottom‐up approach to verifiable embedded system information flow security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 12, doi. 10.1049/iet-ifs.2012.0342
- By:
- Publication type:
- Article
Cryptanalysis of Wang et al.'s improved anonymous multi‐receiver identity‐based encryption scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 8, doi. 10.1049/iet-ifs.2012.0354
- By:
- Publication type:
- Article
Genetically derived secure cluster‐based data aggregation in wireless sensor networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 1, p. 1, doi. 10.1049/iet-ifs.2013.0133
- By:
- Publication type:
- Article