Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iet-ifs/iet-ifs7.bht:"
@article{DBLP:journals/iet-ifs/AkleylekCO13, author = {Sedat Akleylek and Murat Cenk and Ferruh {\"{O}}zbudak}, title = {On the generalisation of special moduli for faster interleaved montgomery modular multiplication}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {165--171}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2010.0271}, doi = {10.1049/IET-IFS.2010.0271}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/AkleylekCO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Al-SalehEC13, author = {Mohammed I. Al{-}Saleh and Antonio M. Espinoza and Jedidiah R. Crandall}, title = {Antivirus performance characterisation: system-wide view}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0192}, doi = {10.1049/IET-IFS.2012.0192}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/Al-SalehEC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Baldi0C13, author = {Marco Baldi and Marco Bianchi and Franco Chiaraluce}, title = {Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {212--220}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0127}, doi = {10.1049/IET-IFS.2012.0127}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Baldi0C13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChenHL13, author = {Yu{-}Chi Chen and Gwoboa Horng and Chao{-}Liang Liu}, title = {Strong non-repudiation based on certificateless short signatures}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {253--263}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0134}, doi = {10.1049/IET-IFS.2012.0134}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChenWM13, author = {Ping Chen and Rui Wu and Bing Mao}, title = {JITSafe: a framework against Just-in-time spraying attacks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {283--292}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0142}, doi = {10.1049/IET-IFS.2012.0142}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChoiS13, author = {Yoon{-}Ho Choi and Seung{-}Woo Seo}, title = {{BLAST:} B-LAyered bad-character {SHIFT} tables for high-speed pattern matching}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {195--202}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0305}, doi = {10.1049/IET-IFS.2011.0305}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChoiS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/CroninW13, author = {Brendan Cronin and Xiaojun Wang}, title = {Hardware acceleration of regular expression repetitions in deep packet inspection}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {327--335}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0340}, doi = {10.1049/IET-IFS.2012.0340}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/CroninW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DengWCX13, author = {Yueming Deng and Guojun Wang and Jiannong Cao and Xin Xiao}, title = {Practical secure and fast handoff framework for pervasive Wi-Fi access}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {22--29}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0092}, doi = {10.1049/IET-IFS.2012.0092}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DengWCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DhanapalS13, author = {Jagadeesan Dhanapal and Srinivasa Krishna Srivatsa}, title = {Link quality-based cache replacement technique in mobile ad hoc network}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {277--282}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0244}, doi = {10.1049/IET-IFS.2012.0244}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DhanapalS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DingHWY13, author = {Baozeng Ding and Yeping He and Yanjun Wu and Jiageng Yu}, title = {Systemic threats to hypervisor non-control data}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {349--354}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0252}, doi = {10.1049/IET-IFS.2012.0252}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DingHWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GillYW13, author = {Khusvinder Gill and Shuang{-}Hua Yang and Wan{-}Liang Wang}, title = {Secure remote access to home automation networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0303}, doi = {10.1049/IET-IFS.2011.0303}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GillYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GunasekaranP13, author = {Muthumanickam Gunasekaran and Kandhasamy Premalatha}, title = {{TEAP:} trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {203--211}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0141}, doi = {10.1049/IET-IFS.2012.0141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GunasekaranP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HanJSSR13, author = {Guangjie Han and Jinfang Jiang and Wen Shen and Lei Shu and Joel J. P. C. Rodrigues}, title = {{IDSEP:} a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0052}, doi = {10.1049/IET-IFS.2012.0052}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HanJSSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HeHC13, author = {Debiao He and Baojun Huang and Jianhua Chen}, title = {New certificateless short signature scheme}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0176}, doi = {10.1049/IET-IFS.2012.0176}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HeHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuaLCLL13, author = {Ying Yan Hua and Jim{-}Min Lin and Che Wun Chiou and Chiou{-}Yng Lee and Yong Huan Liu}, title = {Low space-complexity digit-serial dual basis systolic multiplier over Galois field GF(2\({}^{\mbox{m}}\)) using Hankel matrix and Karatsuba algorithm}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0227}, doi = {10.1049/IET-IFS.2012.0227}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuaLCLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuangCMWYR13, author = {Xin Huang and Bangdao Chen and Andrew Markham and Qinghua Wang and Zheng Yan and A. W. Roscoe}, title = {Human interactive secure key and identity exchange protocols in body sensor networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {30--38}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0080}, doi = {10.1049/IET-IFS.2012.0080}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuangCMWYR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuangL13, author = {Jialin Huang and Xuejia Lai}, title = {Chosen-plaintext linear attacks on Serpent}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {293--299}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0287}, doi = {10.1049/IET-IFS.2012.0287}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JiaoLOGRC13, author = {Dong Jiao and Mingchu Li and Jinping Ou and Cheng Guo and Yizhi Ren and Yongrui Cui}, title = {Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {343--348}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0350}, doi = {10.1049/IET-IFS.2012.0350}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JiaoLOGRC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KaoHGY13, author = {Yung{-}Wei Kao and Kuan{-}Ying Huang and Hui{-}Zhen Gu and Shyan{-}Ming Yuan}, title = {uCloud: a user-centric key management scheme for cloud data protection}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0198}, doi = {10.1049/IET-IFS.2012.0198}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KaoHGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KarasKS13, author = {Dimitrios S. Karas and George K. Karagiannidis and Robert Schober}, title = {Channel level crossing-based security for communications over fading channels}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {221--229}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0360}, doi = {10.1049/IET-IFS.2011.0360}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KarasKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LeeKL13, author = {Jung{-}San Lee and Wei{-}Chiang Kao and Bo Li}, title = {Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {172--180}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0327}, doi = {10.1049/IET-IFS.2011.0327}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LeeKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Li13, author = {Chun{-}Ta Li}, title = {A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {3--10}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0058}, doi = {10.1049/IET-IFS.2012.0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Li13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiD13, author = {Xiaoyong Li and Junping Du}, title = {Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {39--50}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0232}, doi = {10.1049/IET-IFS.2012.0232}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiL13, author = {Jianhua Li and Hui Liu}, title = {Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {265--270}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0304}, doi = {10.1049/IET-IFS.2012.0304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LvL13, author = {Xixiang Lv and Hui Li}, title = {Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2010.0314}, doi = {10.1049/IET-IFS.2010.0314}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LvL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Mahmoud13, author = {Qassim Al Mahmoud}, title = {Polynomial differential-based strong (n, t, n)-verifiable secret sharing}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {312--317}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0366}, doi = {10.1049/IET-IFS.2012.0366}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Mahmoud13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MiaoBL13, author = {Fen Miao and Shu{-}Di Bao and Ye Li}, title = {Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0104}, doi = {10.1049/IET-IFS.2012.0104}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MiaoBL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/NiksefatSM13, author = {Salman Niksefat and Babak Sadeghiyan and Payman Mohassel}, title = {Oblivious decision program evaluation}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0032}, doi = {10.1049/IET-IFS.2012.0032}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/NiksefatSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng13, author = {Kun Peng}, title = {Efficient proof of bid validity with untrusted verifier in homomorphic e-auction}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {11--21}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0076}, doi = {10.1049/IET-IFS.2012.0076}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/PiperS13, author = {Angela Piper and Reihaneh Safavi{-}Naini}, title = {Scalable fragile watermarking for image authentication}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {300--311}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2010.0059}, doi = {10.1049/IET-IFS.2010.0059}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/PiperS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/QiangZWYJS13, author = {Weizhong Qiang and Deqing Zou and Shenglan Wang and Laurence Tianruo Yang and Hai Jin and Lei Shi}, title = {CloudAC: a cloud-oriented multilayer access control system for logic virtual domain}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {51--59}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0094}, doi = {10.1049/IET-IFS.2012.0094}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/QiangZWYJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/RenF13, author = {Fang Ren and Jiulun Fan}, title = {An adaptive distributed certificate management scheme for space information network}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {318--326}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0253}, doi = {10.1049/IET-IFS.2012.0253}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/RenF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TawalbehMA13, author = {Lo'ai Ali Tawalbeh and Moad Mowafi and Walid A. Aljoby}, title = {Use of elliptic curve cryptography for multimedia encryption}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0147}, doi = {10.1049/IET-IFS.2012.0147}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TawalbehMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TianMPJ13, author = {Youliang Tian and Jianfeng Ma and Changgen Peng and Qi Jiang}, title = {Fair (t, n) threshold secret sharing scheme}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0064}, doi = {10.1049/IET-IFS.2012.0064}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TianMPJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VardasbiSM13, author = {Ali Vardasbi and Mahmoud Salmasizadeh and Javad Mohajeri}, title = {Superpoly algebraic normal form monomial test on Trivium}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {230--238}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0175}, doi = {10.1049/IET-IFS.2012.0175}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VardasbiSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WeiP13, author = {Yongzhuang Wei and Enes Pasalic}, title = {On the approximation of S-boxes via Maiorana-McFarland functions}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {2}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0169}, doi = {10.1049/IET-IFS.2012.0169}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WeiP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WuT13, author = {Tsu{-}Yang Wu and Yuh{-}Min Tseng}, title = {Publicly verifiable multi-secret sharing scheme from bilinear pairings}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {239--246}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0105}, doi = {10.1049/IET-IFS.2012.0105}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WuT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YanGBWL13, author = {Xiaopeng Yan and Peng Gong and Zhiquan Bai and Jiantao Wang and Ping Li}, title = {New certificateless public key encryption scheme without pairing}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {4}, pages = {271--276}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0257}, doi = {10.1049/IET-IFS.2012.0257}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YanGBWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YangYL13, author = {Hung{-}Wen Yang and Chou Chen Yang and Woei Lin}, title = {Enhanced digital rights management authentication scheme based on smart card}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {189--194}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0191}, doi = {10.1049/IET-IFS.2012.0191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YangYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YehCHS13, author = {Hsiu{-}lien Yeh and Tien{-}Ho Chen and Kuei{-}Jung Hu and Wei{-}Kuan Shih}, title = {Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {247--252}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0348}, doi = {10.1049/IET-IFS.2011.0348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YehCHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZouMRW13, author = {Youjiao Zou and Wenping Ma and Zhanjun Ran and Shangping Wang}, title = {Newmultivariate hash function quadratic polynomials multiplying linear polynomials}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {181--188}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0035}, doi = {10.1049/IET-IFS.2012.0035}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZouMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.