Works matching IS 17518709 AND DT 2015 AND VI 9 AND IP 4
Results: 7
Distributed key generation protocol with hierarchical threshold access structure.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 248, doi. 10.1049/iet-ifs.2014.0161
- By:
- Publication type:
- Article
Aspectising honeytokens to contain the insider threat.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 240, doi. 10.1049/iet-ifs.2014.0063
- By:
- Publication type:
- Article
Dynamic and verifiable multi‐secret sharing scheme based on Hermite interpolation and bilinear maps.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 234, doi. 10.1049/iet-ifs.2013.0558
- By:
- Publication type:
- Article
Cooperative hybrid self‐healing scheme for secure and data reliability in unattended wireless sensor networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 223, doi. 10.1049/iet-ifs.2014.0267
- By:
- Publication type:
- Article
Impossible differential cryptanalysis of MARS‐like structures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 219, doi. 10.1049/iet-ifs.2014.0183
- By:
- Publication type:
- Article
Differential fault analysis on LED using Super‐Sbox.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 209, doi. 10.1049/iet-ifs.2013.0549
- By:
- Publication type:
- Article
Hijacking the Vuze BitTorrent network: all your hop are belong to us.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 203, doi. 10.1049/iet-ifs.2014.0337
- By:
- Publication type:
- Article