Works matching IS 17518709 AND DT 2014 AND VI 8 AND IP 4
Results: 6
Dynamic rule and rule‐field optimisation for improving firewall performance and security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 250, doi. 10.1049/iet-ifs.2011.0146
- By:
- Publication type:
- Article
Anonymous encryption with partial‐order subset delegation and its application in privacy email systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 240, doi. 10.1049/iet-ifs.2013.0045
- By:
- Publication type:
- Article
Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 234, doi. 10.1049/iet-ifs.2013.0217
- By:
- Publication type:
- Article
Security analysis of two certificateless short signature schemes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 230, doi. 10.1049/iet-ifs.2013.0080
- By:
- Publication type:
- Article
Efficient multistage secret sharing scheme using bilinear map.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 224, doi. 10.1049/iet-ifs.2013.0046
- By:
- Publication type:
- Article
Threshold attribute‐based encryption with attribute hierarchy for lattices in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 217, doi. 10.1049/iet-ifs.2013.0111
- By:
- Publication type:
- Article