Works matching IS 17518709 AND DT 2018 AND VI 12 AND IP 3
Results: 8
Information security collaboration formation in organisations.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 238, doi. 10.1049/iet-ifs.2017.0257
- By:
- Publication type:
- Article
Mimic defense: a designed‐in cybersecurity defense framework.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 226, doi. 10.1049/iet-ifs.2017.0086
- By:
- Publication type:
- Article
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 217, doi. 10.1049/iet-ifs.2017.0075
- By:
- Publication type:
- Article
Receiver‐ and sender‐deniable functional encryption.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 207, doi. 10.1049/iet-ifs.2017.0040
- By:
- Publication type:
- Article
Delegatable functional signatures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 194, doi. 10.1049/iet-ifs.2017.0082
- By:
- Publication type:
- Article
Practical attribute‐based signature schemes for circuits from bilinear map.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 184, doi. 10.1049/iet-ifs.2017.0029
- By:
- Publication type:
- Article
Efficient unlinkable sanitizable signatures from signatures with re‐randomizable keys.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 166, doi. 10.1049/iet-ifs.2017.0041
- By:
- Publication type:
- Article
Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 3, p. 165, doi. 10.1049/iet-ifs.2018.0043
- Publication type:
- Article