Works matching IS 17518709 AND DT 2014 AND VI 8 AND IP 3
1
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 213, doi. 10.1049/iet-ifs.2012.0279
- Wang, Xing‐Yuan;
- Gu, Sheng‐Xian
- Article
2
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 207, doi. 10.1049/iet-ifs.2011.0332
- Article
3
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 199, doi. 10.1049/iet-ifs.2012.0349
- Shen, Haojie;
- Zhuo, Li;
- Zhao, Yingdi
- Article
4
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 188, doi. 10.1049/iet-ifs.2012.0186
- Zadeh, Abdulah Abdulah;
- Heys, Howard M.
- Article
5
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 179, doi. 10.1049/iet-ifs.2012.0352
- Vijayakumar, Pandi;
- Bose, Sudan;
- Kannan, Arputharaj
- Article
6
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 171, doi. 10.1049/iet-ifs.2012.0381
- Article
7
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 161, doi. 10.1049/iet-ifs.2012.0178
- Article
8
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 153, doi. 10.1049/iet-ifs.2013.0202
- Mohammad, Rami M.;
- Thabtah, Fadi;
- McCluskey, Lee
- Article