Works matching IS 17518709 AND DT 2022 AND VI 16 AND IP 6
Results: 7
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA).
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 470, doi. 10.1049/ise2.12077
- By:
- Publication type:
- Article
Matching attacks on Romulus‐M.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 459, doi. 10.1049/ise2.12075
- By:
- Publication type:
- Article
Markov‐GAN: Markov image enhancement method for malicious encrypted traffic classification.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 442, doi. 10.1049/ise2.12071
- By:
- Publication type:
- Article
Erratum: Quantum‐resistant anonymous identity‐based encryption with traceable identities.
- Published in:
- 2022
- Publication type:
- Correction Notice
Renewal of secret and shadows in secret image sharing.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 432, doi. 10.1049/ise2.12068
- By:
- Publication type:
- Article
Secure image block compressive sensing using complex Hadamard measurement matrix and bit‐level XOR.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 417, doi. 10.1049/ise2.12067
- By:
- Publication type:
- Article
Blockchain‐based deduplication with arbitration and incentives.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 401, doi. 10.1049/ise2.12066
- By:
- Publication type:
- Article