Works matching IS 17518709 AND DT 2023 AND VI 17 AND IP 4
Results: 11
Defending against social engineering attacks: A security pattern‐based analysis framework.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 703, doi. 10.1049/ise2.12125
- By:
- Publication type:
- Article
Revocable identity‐based matchmaking encryption in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 567, doi. 10.1049/ise2.12116
- By:
- Publication type:
- Article
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 598, doi. 10.1049/ise2.12118
- By:
- Publication type:
- Article
Search framework for neutral bits and boomerangs in SHA‐1 collision attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 647, doi. 10.1049/ise2.12122
- By:
- Publication type:
- Article
Exploiting statistical effective fault attack in a blind setting.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 639, doi. 10.1049/ise2.12121
- By:
- Publication type:
- Article
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 626, doi. 10.1049/ise2.12120
- By:
- Publication type:
- Article
Solving blockchain trilemma using off‐chain storage protocol.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 681, doi. 10.1049/ise2.12124
- By:
- Publication type:
- Article
An optimisation for a two‐round good‐case latency protocol.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 664, doi. 10.1049/ise2.12123
- By:
- Publication type:
- Article
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 582, doi. 10.1049/ise2.12117
- By:
- Publication type:
- Article
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 553, doi. 10.1049/ise2.12115
- By:
- Publication type:
- Article
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 616, doi. 10.1049/ise2.12119
- By:
- Publication type:
- Article