Works matching IS 17518709 AND DT 2018 AND VI 12 AND IP 6
Results: 12
OPEXA: analyser assistant for detecting over‐privileged extensions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 558, doi. 10.1049/iet-ifs.2017.0652
- By:
- Publication type:
- Article
Preprocessing optimisation: revisiting recursive‐BKZ lattice reduction algorithm.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 551, doi. 10.1049/iet-ifs.2017.0400
- By:
- Publication type:
- Article
Vulnerability modelling of crypto‐chips against scan‐based attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 543, doi. 10.1049/iet-ifs.2017.0440
- By:
- Publication type:
- Article
Supervised learning framework for covert channel detection in LTE‐A.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 534, doi. 10.1049/iet-ifs.2017.0394
- By:
- Publication type:
- Article
New algorithms for the unbalanced generalised birthday problem.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 527, doi. 10.1049/iet-ifs.2017.0495
- By:
- Publication type:
- Article
Physical feasibility of QKD based on probabilistic quantum circuits.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 521, doi. 10.1049/iet-ifs.2017.0375
- By:
- Publication type:
- Article
Improved integral attacks without full codebook.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 513, doi. 10.1049/iet-ifs.2017.0388
- By:
- Publication type:
- Article
Detection and differentiation of application layer DDoS attack from flash events using fuzzy‐GA computation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 502, doi. 10.1049/iet-ifs.2017.0500
- By:
- Publication type:
- Article
Equivalent key attack against a public‐key cryptosystem based on subset sum problem.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 498, doi. 10.1049/iet-ifs.2018.0041
- By:
- Publication type:
- Article
Guess‐and‐determine attacks on PANAMA‐like stream ciphers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 484, doi. 10.1049/iet-ifs.2017.0553
- By:
- Publication type:
- Article
Efficient batch identity‐based fully homomorphic encryption scheme in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 475, doi. 10.1049/iet-ifs.2017.0567
- By:
- Publication type:
- Article
CryptoSAT: a tool for SAT‐based cryptanalysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 463, doi. 10.1049/iet-ifs.2017.0176
- By:
- Publication type:
- Article