Found: 7
Select item for more details and to access through your institution.
Logarithmic size ring signatures without random oracles.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 1, doi. 10.1049/iet-ifs.2014.0428
- By:
- Publication type:
- Article
Unified security model of authenticated key exchange with specific adversarial capabilities.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 8, doi. 10.1049/iet-ifs.2014.0234
- By:
- Publication type:
- Article
Random table and hash coding‐based binary code obfuscation against stack trace analysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 18, doi. 10.1049/iet-ifs.2013.0137
- By:
- Publication type:
- Article
Deterministic cloned tag detection protocol for anonymous radio‐frequency identification systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 28, doi. 10.1049/iet-ifs.2014.0504
- By:
- Publication type:
- Article
Efficient ways of prime number generation for ring signatures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 33, doi. 10.1049/iet-ifs.2014.0547
- By:
- Publication type:
- Article
Information fusion‐based method for distributed domain name system cache poisoning attack detection and identification.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 37, doi. 10.1049/iet-ifs.2014.0386
- By:
- Publication type:
- Article
Robustness of text‐based completely automated public turing test to tell computers and humans apart.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 1, p. 45, doi. 10.1049/iet-ifs.2014.0381
- By:
- Publication type:
- Article