Works matching IS 17518709 AND DT 2020 AND VI 14 AND IP 6
Results: 17
Non‐stochastic hypothesis testing for privacy.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 754, doi. 10.1049/iet-ifs.2020.0223
- By:
- Publication type:
- Article
Achieving secure and convenient WLAN sharing in personal.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 733, doi. 10.1049/iet-ifs.2020.0134
- By:
- Publication type:
- Article
Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 724, doi. 10.1049/iet-ifs.2020.0096
- By:
- Publication type:
- Article
More realistic analysis of mass surveillance – security in multi‐surveillant settings.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 641, doi. 10.1049/iet-ifs.2020.0090
- By:
- Publication type:
- Article
SPCOR: a secure and privacy‐preserving protocol for mobile‐healthcare emergency to reap computing opportunities at remote and nearby.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 670, doi. 10.1049/iet-ifs.2020.0086
- By:
- Publication type:
- Article
P<sup>2</sup> KASE A<sup>2</sup> —privacy‐preserving key aggregate searchable encryption supporting authentication and access control on multi‐delegation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 704, doi. 10.1049/iet-ifs.2020.0070
- By:
- Publication type:
- Article
Tightly‐secure two‐pass authenticated key exchange protocol using twin Diffie–Hellman problem.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 764, doi. 10.1049/iet-ifs.2020.0047
- By:
- Publication type:
- Article
Efficient elliptic curve Diffie‐Hellman computation at the 256‐bit security level.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 633, doi. 10.1049/iet-ifs.2019.0620
- By:
- Publication type:
- Article
Statistical watermarking approach for 3D mesh using local curvature estimation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 745, doi. 10.1049/iet-ifs.2019.0601
- By:
- Publication type:
- Article
Pairing free identity based aggregate signcryption scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 625, doi. 10.1049/iet-ifs.2019.0579
- By:
- Publication type:
- Article
C‐NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 683, doi. 10.1049/iet-ifs.2019.0567
- By:
- Publication type:
- Article
New dynamic and verifiable multi‐secret sharing schemes based on LFSR public key cryptosystem.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 783, doi. 10.1049/iet-ifs.2019.0437
- By:
- Publication type:
- Article
Post‐quantum protocol for computing set intersection cardinality with linear complexity.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 661, doi. 10.1049/iet-ifs.2019.0315
- By:
- Publication type:
- Article
GUIM‐SMD: guilty user identification model using summation matrix‐based distribution.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 773, doi. 10.1049/iet-ifs.2019.0203
- By:
- Publication type:
- Article
Economic feasibility study for stealthy socialbot network establishment.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 694, doi. 10.1049/iet-ifs.2019.0152
- By:
- Publication type:
- Article
Efficient blacklistable anonymous credential system with reputation using a pairing‐based accumulator.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 613, doi. 10.1049/iet-ifs.2018.5505
- By:
- Publication type:
- Article
Further study on constructing bent functions outside the completed Maiorana–McFarland class.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 6, p. 654, doi. 10.1049/iet-ifs.2018.5425
- By:
- Publication type:
- Article