Works matching IS 17518709 AND DT 2019 AND VI 13 AND IP 4
Results: 13
Security of generalised Reed–Solomon code‐based cryptosystems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 404, doi. 10.1049/iet-ifs.2018.5207
- By:
- Publication type:
- Article
Encrypted secure polar coding scheme for general two‐way wiretap channel.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 393, doi. 10.1049/iet-ifs.2018.5472
- By:
- Publication type:
- Article
Dinamite: internal differential match‐in‐the‐end attack on eight‐round PAEQ.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 378, doi. 10.1049/iet-ifs.2018.5033
- By:
- Publication type:
- Article
Dynamic API call sequence visualisation for malware classification.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 367, doi. 10.1049/iet-ifs.2018.5268
- By:
- Publication type:
- Article
Non‐quantum cryptanalysis of the noisy version of Aaronson–Christiano's quantum money scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 362, doi. 10.1049/iet-ifs.2018.5307
- By:
- Publication type:
- Article
Leveraging deep neural networks for anomaly‐based web application firewall.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 352, doi. 10.1049/iet-ifs.2018.5404
- By:
- Publication type:
- Article
How to construct a verifiable multi‐secret sharing scheme based on graded encoding schemes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 343, doi. 10.1049/iet-ifs.2018.5306
- By:
- Publication type:
- Article
Public key authenticated encryption with keyword search: revisited.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 336, doi. 10.1049/iet-ifs.2018.5315
- By:
- Publication type:
- Article
Certifying multi‐power RSA.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 330, doi. 10.1049/iet-ifs.2018.5178
- By:
- Publication type:
- Article
Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 321, doi. 10.1049/iet-ifs.2018.5295
- By:
- Publication type:
- Article
PriVeto: a fully private two‐round veto protocol.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 311, doi. 10.1049/iet-ifs.2018.5115
- By:
- Publication type:
- Article
Chosen message strategy to improve the correlation power analysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 304, doi. 10.1049/iet-ifs.2018.5103
- By:
- Publication type:
- Article
Detecting new generations of threats using attribute‐based attack graphs.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 293, doi. 10.1049/iet-ifs.2018.5409
- By:
- Publication type:
- Article