Works matching IS 17518709 AND DT 2015 AND VI 9 AND IP 6
Results: 10
Cryptanalysis and improvement of a certificateless partially blind signature.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 380, doi. 10.1049/iet-ifs.2014.0293
- By:
- Publication type:
- Article
Constructing important features from massive network traffic for lightweight intrusion detection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 374, doi. 10.1049/iet-ifs.2014.0353
- By:
- Publication type:
- Article
Crypto‐based algorithms for secured medical image transmission.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 365, doi. 10.1049/iet-ifs.2014.0245
- By:
- Publication type:
- Article
Improved cryptanalysis on RIPEMD‐128.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 354, doi. 10.1049/iet-ifs.2014.0244
- By:
- Publication type:
- Article
Exploring risk flow attack graph for security risk assessment.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 344, doi. 10.1049/iet-ifs.2014.0272
- By:
- Publication type:
- Article
Enhanced inter‐access service network handover authentication scheme for IEEE 802.16m network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 334, doi. 10.1049/iet-ifs.2013.0170
- By:
- Publication type:
- Article
Watch your constants: malicious Streebog.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 328, doi. 10.1049/iet-ifs.2014.0540
- By:
- Publication type:
- Article
Practical‐time related‐key attack on Hummingbird‐2.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 321, doi. 10.1049/iet-ifs.2014.0424
- By:
- Publication type:
- Article
High accuracy android malware detection using ensemble learning.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 313, doi. 10.1049/iet-ifs.2014.0099
- By:
- Publication type:
- Article
Modelling and analysis of rule‐based network security middleboxes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 6, p. 305, doi. 10.1049/iet-ifs.2014.0545
- By:
- Publication type:
- Article