Works matching IS 17518709 AND DT 2019 AND VI 13 AND IP 6
Results: 18
Dynamic asymmetric group key agreement protocol with traitor traceability.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 703, doi. 10.1049/iet-ifs.2019.0177
- By:
- Publication type:
- Article
Charge balancing symmetric pre‐resolve adiabatic logic against power analysis attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 692, doi. 10.1049/iet-ifs.2018.5136
- By:
- Publication type:
- Article
Revisiting BGG<sup>+</sup> 14 ABE with weakness analysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 685, doi. 10.1049/iet-ifs.2019.0120
- By:
- Publication type:
- Article
Leakage‐resilient lattice‐based partially blind signatures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 670, doi. 10.1049/iet-ifs.2019.0156
- By:
- Publication type:
- Article
Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm‐based feature selection and weighting.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 659, doi. 10.1049/iet-ifs.2019.0006
- By:
- Publication type:
- Article
Enhanced secure data backup scheme using multi‐factor authentication.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 649, doi. 10.1049/iet-ifs.2018.5380
- By:
- Publication type:
- Article
Fully homomorphic encryption based on the ring learning with rounding problem.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 639, doi. 10.1049/iet-ifs.2018.5427
- By:
- Publication type:
- Article
Multi‐key homomorphic authenticators.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 618, doi. 10.1049/iet-ifs.2018.5341
- By:
- Publication type:
- Article
Division polynomial‐based elliptic curve scalar multiplication revisited.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 614, doi. 10.1049/iet-ifs.2018.5361
- By:
- Publication type:
- Article
Distinguisher and non‐randomness of Grain‐v1 for 112, 114 and 116 initialisation rounds with multiple‐bit difference in IVs.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 603, doi. 10.1049/iet-ifs.2018.5276
- By:
- Publication type:
- Article
Cryptanalysis for reduced round Salsa and ChaCha: revisited.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 591, doi. 10.1049/iet-ifs.2018.5328
- By:
- Publication type:
- Article
Witness indistinguishability and witness hiding against quantum attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 579, doi. 10.1049/iet-ifs.2018.5460
- By:
- Publication type:
- Article
Transforming malicious code to ROP gadgets for antivirus evasion.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 570, doi. 10.1049/iet-ifs.2018.5386
- By:
- Publication type:
- Article
Guess and determine cryptanalysis with variable sampling and its applications.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 559, doi. 10.1049/iet-ifs.2018.5233
- By:
- Publication type:
- Article
Advanced encryption standard based on key dependent S‐Box cube.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 552, doi. 10.1049/iet-ifs.2018.5043
- By:
- Publication type:
- Article
Dynamical model for individual defence against cyber epidemic attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 541, doi. 10.1049/iet-ifs.2018.5147
- By:
- Publication type:
- Article
Fair and private rewarding in a coalitional game of cybersecurity information sharing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 530, doi. 10.1049/iet-ifs.2018.5079
- By:
- Publication type:
- Article
Image‐based CAPTCHAs based on neural style transfer.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 519, doi. 10.1049/iet-ifs.2018.5036
- By:
- Publication type:
- Article