Works matching IS 17518709 AND DT 2014 AND VI 8 AND IP 2
1
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 140, doi. 10.1049/iet-ifs.2012.0343
- Bai, Hao;
- Hu, Chang‐zhen;
- Jing, Xiao‐chuan;
- Li, Ning;
- Wang, Xiao‐yin
- Article
2
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 132, doi. 10.1049/iet-ifs.2012.0220
- Petrlic, Ronald;
- Sorge, Christoph
- Article
3
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 122, doi. 10.1049/iet-ifs.2012.0346
- Kaczmarek, Jerzy;
- Wrobel, Michal R.
- Article
4
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 114, doi. 10.1049/iet-ifs.2012.0271
- Wang, Huaqun;
- Wu, Qianhong;
- Qin, Bo;
- Domingo‐Ferrer, Josep
- Article
5
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 104, doi. 10.1049/iet-ifs.2012.0206
- Leu, Jenq‐Shiou;
- Hsieh, Wen‐Bin
- Article
6
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 88, doi. 10.1049/iet-ifs.2012.0145
- Xia, Hui;
- Jia, Zhiping;
- Sha, Edwin H.‐M.
- Article
7
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 80, doi. 10.1049/iet-ifs.2012.0202
- Hanapi, Zurina Mohd;
- Ismail, Mahamod
- Article
8
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 2, p. 67, doi. 10.1049/iet-ifs.2012.0133
- Article