Works matching IS 17518709 AND DT 2020 AND VI 14 AND IP 1
Results: 15
Ways to merge two secret sharing schemes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 146, doi. 10.1049/iet-ifs.2019.0210
- By:
- Publication type:
- Article
New method for assets sensitivity calculation and technical risks assessment in the information systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 133, doi. 10.1049/iet-ifs.2018.5390
- By:
- Publication type:
- Article
Integral distinguishers for Grøstl‐512 and Kupyna‐512 permutation functions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 126, doi. 10.1049/iet-ifs.2019.0056
- By:
- Publication type:
- Article
Specifications and improvements of LPN solving algorithms.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 111, doi. 10.1049/iet-ifs.2018.5448
- By:
- Publication type:
- Article
Secure hierarchical authentication protocol in VANET.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 99, doi. 10.1049/iet-ifs.2019.0249
- By:
- Publication type:
- Article
Contextual‐based approach to reduce false positives.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 89, doi. 10.1049/iet-ifs.2018.5479
- By:
- Publication type:
- Article
Dynamic resource virtualisation method for survivability enhancement based on SDN.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 82, doi. 10.1049/iet-ifs.2018.5251
- By:
- Publication type:
- Article
Cube distinguisher extraction using division property in block ciphers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 72, doi. 10.1049/iet-ifs.2018.5252
- By:
- Publication type:
- Article
How to build a vulnerability benchmark to overcome cyber security attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 60, doi. 10.1049/iet-ifs.2018.5647
- By:
- Publication type:
- Article
Secure signal processing using fully homomorphic encryption.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 51, doi. 10.1049/iet-ifs.2019.0157
- By:
- Publication type:
- Article
Correlation‐based sequence alignment models for detecting masquerades in cloud computing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 39, doi. 10.1049/iet-ifs.2019.0409
- By:
- Publication type:
- Article
Implementing confidential transactions with lattice techniques.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 30, doi. 10.1049/iet-ifs.2018.5491
- By:
- Publication type:
- Article
An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 21, doi. 10.1049/iet-ifs.2018.5443
- By:
- Publication type:
- Article
MILP‐aided bit‐based division property for primitives with non‐bit‐permutation linear layers.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 12, doi. 10.1049/iet-ifs.2018.5283
- By:
- Publication type:
- Article
Mining of intrusion attack in SCADA network using clustering and genetically seeded flora‐based optimal classification algorithm.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 1, doi. 10.1049/iet-ifs.2019.0011
- By:
- Publication type:
- Article