Works matching IS 17518709 AND DT 2018 AND VI 12 AND IP 5
Results: 10
Server notaries: a complementary approach to the web PKI trust model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 455, doi. 10.1049/iet-ifs.2016.0611
- By:
- Publication type:
- Article
Sequential opening multi‐jammers localisation in multi‐hop wireless network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 445, doi. 10.1049/iet-ifs.2017.0346
- By:
- Publication type:
- Article
RTTV: a dynamic CFI measurement tool based on TPM.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 438, doi. 10.1049/iet-ifs.2017.0459
- By:
- Publication type:
- Article
Smartphone passcode prediction.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 431, doi. 10.1049/iet-ifs.2017.0606
- By:
- Publication type:
- Article
Method for measuring the privacy level of pre‐published dataset.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 425, doi. 10.1049/iet-ifs.2017.0341
- By:
- Publication type:
- Article
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 419, doi. 10.1049/iet-ifs.2017.0196
- By:
- Publication type:
- Article
Linear complexity of Legendre‐polynomial quotients.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 414, doi. 10.1049/iet-ifs.2017.0307
- By:
- Publication type:
- Article
Anomaly‐based exploratory analysis and detection of exploits in android mediaserver.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 404, doi. 10.1049/iet-ifs.2017.0460
- By:
- Publication type:
- Article
User‐friendly XOR‐based visual secret sharing by random grid.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 398, doi. 10.1049/iet-ifs.2017.0546
- By:
- Publication type:
- Article
Weak keys of the full MISTY1 block cipher for related‐key amplified boomerang cryptanalysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 5, p. 389, doi. 10.1049/iet-ifs.2017.0173
- By:
- Publication type:
- Article