Works matching IS 17518709 AND DT 2015 AND VI 9 AND IP 1
Results: 10
Erratum: 'Simple power analysis applied to nonlinear feedback shift registers'.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 90, doi. 10.1049/iet-ifs.2014.0524
- Publication type:
- Article
Approaching secure industrial control systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 81, doi. 10.1049/iet-ifs.2013.0159
- By:
- Publication type:
- Article
PESCA: a peer‐to‐peer social network architecture with privacy‐enabled social communication and data availability.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 73, doi. 10.1049/iet-ifs.2013.0256
- By:
- Publication type:
- Article
Transferable conditional e‐cash with optimal anonymity in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 59, doi. 10.1049/iet-ifs.2013.0138
- By:
- Publication type:
- Article
Efficient abuse‐free fair contract‐signing protocol based on an ordinary crisp commitment scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 50, doi. 10.1049/iet-ifs.2012.0277
- By:
- Publication type:
- Article
Proof of retrievability with public verifiability resilient against related‐key attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 43, doi. 10.1049/iet-ifs.2013.0322
- By:
- Publication type:
- Article
Efficient chosen‐ciphertext secure public‐key encryption scheme with high leakage‐resilience.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 32, doi. 10.1049/iet-ifs.2013.0173
- By:
- Publication type:
- Article
Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 24, doi. 10.1049/iet-ifs.2013.0145
- By:
- Publication type:
- Article
Parallel key management scheme for mobile ad hoc network based on traffic mining.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 14, doi. 10.1049/iet-ifs.2013.0076
- By:
- Publication type:
- Article
Sophisticated security verification on routing repaired balanced cell‐based dual‐rail logic against side channel analysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 1, p. 1, doi. 10.1049/iet-ifs.2013.0058
- By:
- Publication type:
- Article