Found: 5
Select item for more details and to access through your institution.
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 3, p. 205, doi. 10.1049/ise2.12013
- By:
- Publication type:
- Article
How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 3, p. 223, doi. 10.1049/ise2.12016
- By:
- Publication type:
- Article
Towards practical intrusion detection system over encrypted traffic*.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 3, p. 231, doi. 10.1049/ise2.12017
- By:
- Publication type:
- Article
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 3, p. 247, doi. 10.1049/ise2.12019
- By:
- Publication type:
- Article
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment.
- Published in:
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 3, p. 256, doi. 10.1049/ise2.12024
- By:
- Publication type:
- Article