Works matching IS 17518709 AND DT 2016 AND VI 10 AND IP 3
Results: 7
Covert communications through mobile voice channels.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 156, doi. 10.1049/iet-ifs.2014.0555
- By:
- Publication type:
- Article
Key recovery on several matrix public‐key encryption schemes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 152, doi. 10.1049/iet-ifs.2015.0183
- By:
- Publication type:
- Article
Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 142, doi. 10.1049/iet-ifs.2015.0026
- By:
- Publication type:
- Article
Supervised approach for detecting average over popular items attack in collaborative recommender systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 134, doi. 10.1049/iet-ifs.2015.0067
- By:
- Publication type:
- Article
Border gateway protocol graph: detecting and visualising internet routing anomalies.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 125, doi. 10.1049/iet-ifs.2014.0525
- By:
- Publication type:
- Article
Authenticating multi‐dimensional query results in outsourced database.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 119, doi. 10.1049/iet-ifs.2014.0408
- By:
- Publication type:
- Article
Empirical analysis of Tor Hidden Services.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 113, doi. 10.1049/iet-ifs.2015.0121
- By:
- Publication type:
- Article