Search dblp for Publications

export results for "toc:db/journals/iet-ifs/iet-ifs7.bht:"

 download as .bib file

@article{DBLP:journals/iet-ifs/AkleylekCO13,
  author       = {Sedat Akleylek and
                  Murat Cenk and
                  Ferruh {\"{O}}zbudak},
  title        = {On the generalisation of special moduli for faster interleaved montgomery
                  modular multiplication},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {165--171},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0271},
  doi          = {10.1049/IET-IFS.2010.0271},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AkleylekCO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Al-SalehEC13,
  author       = {Mohammed I. Al{-}Saleh and
                  Antonio M. Espinoza and
                  Jedidiah R. Crandall},
  title        = {Antivirus performance characterisation: system-wide view},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0192},
  doi          = {10.1049/IET-IFS.2012.0192},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Al-SalehEC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Baldi0C13,
  author       = {Marco Baldi and
                  Marco Bianchi and
                  Franco Chiaraluce},
  title        = {Security and complexity of the McEliece cryptosystem based on quasi-cyclic
                  low-density parity-check codes},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {212--220},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0127},
  doi          = {10.1049/IET-IFS.2012.0127},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Baldi0C13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenHL13,
  author       = {Yu{-}Chi Chen and
                  Gwoboa Horng and
                  Chao{-}Liang Liu},
  title        = {Strong non-repudiation based on certificateless short signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {253--263},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0134},
  doi          = {10.1049/IET-IFS.2012.0134},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenWM13,
  author       = {Ping Chen and
                  Rui Wu and
                  Bing Mao},
  title        = {JITSafe: a framework against Just-in-time spraying attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {283--292},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0142},
  doi          = {10.1049/IET-IFS.2012.0142},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChoiS13,
  author       = {Yoon{-}Ho Choi and
                  Seung{-}Woo Seo},
  title        = {{BLAST:} B-LAyered bad-character {SHIFT} tables for high-speed pattern
                  matching},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {195--202},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0305},
  doi          = {10.1049/IET-IFS.2011.0305},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChoiS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/CroninW13,
  author       = {Brendan Cronin and
                  Xiaojun Wang},
  title        = {Hardware acceleration of regular expression repetitions in deep packet
                  inspection},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {327--335},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0340},
  doi          = {10.1049/IET-IFS.2012.0340},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/CroninW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DengWCX13,
  author       = {Yueming Deng and
                  Guojun Wang and
                  Jiannong Cao and
                  Xin Xiao},
  title        = {Practical secure and fast handoff framework for pervasive Wi-Fi access},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {22--29},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0092},
  doi          = {10.1049/IET-IFS.2012.0092},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DengWCX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DhanapalS13,
  author       = {Jagadeesan Dhanapal and
                  Srinivasa Krishna Srivatsa},
  title        = {Link quality-based cache replacement technique in mobile ad hoc network},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {277--282},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0244},
  doi          = {10.1049/IET-IFS.2012.0244},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DhanapalS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DingHWY13,
  author       = {Baozeng Ding and
                  Yeping He and
                  Yanjun Wu and
                  Jiageng Yu},
  title        = {Systemic threats to hypervisor non-control data},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {349--354},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0252},
  doi          = {10.1049/IET-IFS.2012.0252},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DingHWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GillYW13,
  author       = {Khusvinder Gill and
                  Shuang{-}Hua Yang and
                  Wan{-}Liang Wang},
  title        = {Secure remote access to home automation networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0303},
  doi          = {10.1049/IET-IFS.2011.0303},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GillYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GunasekaranP13,
  author       = {Muthumanickam Gunasekaran and
                  Kandhasamy Premalatha},
  title        = {{TEAP:} trust-enhanced anonymous on-demand routing protocol for mobile
                  ad hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {203--211},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0141},
  doi          = {10.1049/IET-IFS.2012.0141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GunasekaranP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HanJSSR13,
  author       = {Guangjie Han and
                  Jinfang Jiang and
                  Wen Shen and
                  Lei Shu and
                  Joel J. P. C. Rodrigues},
  title        = {{IDSEP:} a novel intrusion detection scheme based on energy prediction
                  in cluster-based wireless sensor networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0052},
  doi          = {10.1049/IET-IFS.2012.0052},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HanJSSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HeHC13,
  author       = {Debiao He and
                  Baojun Huang and
                  Jianhua Chen},
  title        = {New certificateless short signature scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0176},
  doi          = {10.1049/IET-IFS.2012.0176},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HeHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuaLCLL13,
  author       = {Ying Yan Hua and
                  Jim{-}Min Lin and
                  Che Wun Chiou and
                  Chiou{-}Yng Lee and
                  Yong Huan Liu},
  title        = {Low space-complexity digit-serial dual basis systolic multiplier over
                  Galois field GF(2\({}^{\mbox{m}}\)) using Hankel matrix and Karatsuba
                  algorithm},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0227},
  doi          = {10.1049/IET-IFS.2012.0227},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuaLCLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuangCMWYR13,
  author       = {Xin Huang and
                  Bangdao Chen and
                  Andrew Markham and
                  Qinghua Wang and
                  Zheng Yan and
                  A. W. Roscoe},
  title        = {Human interactive secure key and identity exchange protocols in body
                  sensor networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {30--38},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0080},
  doi          = {10.1049/IET-IFS.2012.0080},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuangCMWYR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuangL13,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Chosen-plaintext linear attacks on Serpent},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {293--299},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0287},
  doi          = {10.1049/IET-IFS.2012.0287},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuangL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JiaoLOGRC13,
  author       = {Dong Jiao and
                  Mingchu Li and
                  Jinping Ou and
                  Cheng Guo and
                  Yizhi Ren and
                  Yongrui Cui},
  title        = {Traceable, group-oriented, signature scheme with multiple signing
                  policies in group-based trust management},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {343--348},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0350},
  doi          = {10.1049/IET-IFS.2012.0350},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JiaoLOGRC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KaoHGY13,
  author       = {Yung{-}Wei Kao and
                  Kuan{-}Ying Huang and
                  Hui{-}Zhen Gu and
                  Shyan{-}Ming Yuan},
  title        = {uCloud: a user-centric key management scheme for cloud data protection},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0198},
  doi          = {10.1049/IET-IFS.2012.0198},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KaoHGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KarasKS13,
  author       = {Dimitrios S. Karas and
                  George K. Karagiannidis and
                  Robert Schober},
  title        = {Channel level crossing-based security for communications over fading
                  channels},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {221--229},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0360},
  doi          = {10.1049/IET-IFS.2011.0360},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KarasKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LeeKL13,
  author       = {Jung{-}San Lee and
                  Wei{-}Chiang Kao and
                  Bo Li},
  title        = {Aryabhata remainder theorem-based non-iterative electronic lottery
                  mechanism with robustness},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {172--180},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0327},
  doi          = {10.1049/IET-IFS.2011.0327},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LeeKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Li13,
  author       = {Chun{-}Ta Li},
  title        = {A new password authentication and user anonymity scheme based on elliptic
                  curve cryptography and smart card},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {3--10},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0058},
  doi          = {10.1049/IET-IFS.2012.0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Li13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiD13,
  author       = {Xiaoyong Li and
                  Junping Du},
  title        = {Adaptive and attribute-based trust model for service level agreement
                  guarantee in cloud computing},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {39--50},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0232},
  doi          = {10.1049/IET-IFS.2012.0232},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiL13,
  author       = {Jianhua Li and
                  Hui Liu},
  title        = {Colour image encryption based on advanced encryption standard algorithm
                  with two-dimensional chaotic map},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {265--270},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0304},
  doi          = {10.1049/IET-IFS.2012.0304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LvL13,
  author       = {Xixiang Lv and
                  Hui Li},
  title        = {Secure group communication with both confidentiality and non-repudiation
                  for mobile ad-hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0314},
  doi          = {10.1049/IET-IFS.2010.0314},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Mahmoud13,
  author       = {Qassim Al Mahmoud},
  title        = {Polynomial differential-based strong (n, t, n)-verifiable secret sharing},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {312--317},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0366},
  doi          = {10.1049/IET-IFS.2012.0366},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Mahmoud13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MiaoBL13,
  author       = {Fen Miao and
                  Shu{-}Di Bao and
                  Ye Li},
  title        = {Biometric key distribution solution with energy distribution information
                  of physiological signals for body sensor network security},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0104},
  doi          = {10.1049/IET-IFS.2012.0104},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MiaoBL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/NiksefatSM13,
  author       = {Salman Niksefat and
                  Babak Sadeghiyan and
                  Payman Mohassel},
  title        = {Oblivious decision program evaluation},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0032},
  doi          = {10.1049/IET-IFS.2012.0032},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/NiksefatSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng13,
  author       = {Kun Peng},
  title        = {Efficient proof of bid validity with untrusted verifier in homomorphic
                  e-auction},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {11--21},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0076},
  doi          = {10.1049/IET-IFS.2012.0076},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/PiperS13,
  author       = {Angela Piper and
                  Reihaneh Safavi{-}Naini},
  title        = {Scalable fragile watermarking for image authentication},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {300--311},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0059},
  doi          = {10.1049/IET-IFS.2010.0059},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/PiperS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/QiangZWYJS13,
  author       = {Weizhong Qiang and
                  Deqing Zou and
                  Shenglan Wang and
                  Laurence Tianruo Yang and
                  Hai Jin and
                  Lei Shi},
  title        = {CloudAC: a cloud-oriented multilayer access control system for logic
                  virtual domain},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {51--59},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0094},
  doi          = {10.1049/IET-IFS.2012.0094},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/QiangZWYJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RenF13,
  author       = {Fang Ren and
                  Jiulun Fan},
  title        = {An adaptive distributed certificate management scheme for space information
                  network},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {318--326},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0253},
  doi          = {10.1049/IET-IFS.2012.0253},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/RenF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TawalbehMA13,
  author       = {Lo'ai Ali Tawalbeh and
                  Moad Mowafi and
                  Walid A. Aljoby},
  title        = {Use of elliptic curve cryptography for multimedia encryption},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0147},
  doi          = {10.1049/IET-IFS.2012.0147},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TawalbehMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TianMPJ13,
  author       = {Youliang Tian and
                  Jianfeng Ma and
                  Changgen Peng and
                  Qi Jiang},
  title        = {Fair (t, n) threshold secret sharing scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0064},
  doi          = {10.1049/IET-IFS.2012.0064},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TianMPJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VardasbiSM13,
  author       = {Ali Vardasbi and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri},
  title        = {Superpoly algebraic normal form monomial test on Trivium},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {230--238},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0175},
  doi          = {10.1049/IET-IFS.2012.0175},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VardasbiSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WeiP13,
  author       = {Yongzhuang Wei and
                  Enes Pasalic},
  title        = {On the approximation of S-boxes via Maiorana-McFarland functions},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {2},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0169},
  doi          = {10.1049/IET-IFS.2012.0169},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WeiP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WuT13,
  author       = {Tsu{-}Yang Wu and
                  Yuh{-}Min Tseng},
  title        = {Publicly verifiable multi-secret sharing scheme from bilinear pairings},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {239--246},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0105},
  doi          = {10.1049/IET-IFS.2012.0105},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WuT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YanGBWL13,
  author       = {Xiaopeng Yan and
                  Peng Gong and
                  Zhiquan Bai and
                  Jiantao Wang and
                  Ping Li},
  title        = {New certificateless public key encryption scheme without pairing},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {271--276},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0257},
  doi          = {10.1049/IET-IFS.2012.0257},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YanGBWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YangYL13,
  author       = {Hung{-}Wen Yang and
                  Chou Chen Yang and
                  Woei Lin},
  title        = {Enhanced digital rights management authentication scheme based on
                  smart card},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {189--194},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0191},
  doi          = {10.1049/IET-IFS.2012.0191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YangYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YehCHS13,
  author       = {Hsiu{-}lien Yeh and
                  Tien{-}Ho Chen and
                  Kuei{-}Jung Hu and
                  Wei{-}Kuan Shih},
  title        = {Robust elliptic curve cryptography-based three factor user authentication
                  providing privacy of biometric data},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {247--252},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0348},
  doi          = {10.1049/IET-IFS.2011.0348},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YehCHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZouMRW13,
  author       = {Youjiao Zou and
                  Wenping Ma and
                  Zhanjun Ran and
                  Shangping Wang},
  title        = {Newmultivariate hash function quadratic polynomials multiplying linear
                  polynomials},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {181--188},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0035},
  doi          = {10.1049/IET-IFS.2012.0035},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZouMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics