IET Information Security
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 167
-
Provably secure certificateless aggregate signature scheme with designated verifier in an improved security modelShen, Limin / Ma, Jianfeng / Miao, Yinbin et al. | 2018
- 174
-
Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behavioursZhang, Fuzhi / Ling, Zhoujun / Wang, Shilei et al. | 2019
- 188
-
HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clusteringRaja Sree, Thankaraja / Saira Bhanu, Somasundaram Mary et al. | 2019
- 201
-
Event reconstruction using temporal pattern of file system modificationSoltani, Somayeh / Seno, Seyed Amin Hosseini / Sadoghi Yazdi, Hadi et al. | 2019
- 213
-
Security and fault tolerance evaluation of TMR–QDI circuitsAit Abdelmalek, Ghania / Ziani, Rezki / Mokdad, Rabah et al. | 2019
- 223
-
Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logicSohail, Muhammad / Wang, Liangmin / Jiang, Shunrong et al. | 2019
- 231
-
Fast Montgomery modular multiplier for Rivest–Shamir–Adleman cryptosystemParihar, Aashish / Nakhate, Sangeeta et al. | 2019
- 239
-
Impact assessment of policy expressiveness of an optimised access control model for smart sensorsUriarte, Mikel / Astorga, Jasone / Jacob, Eduardo et al. | 2019
- 249
-
Base for algebraic cryptanalysis based on combined representation of S-boxUnlu, Bekir et al. | 2019
- 258
-
Re-definable access control over outsourced data in cloud storage systemsZhang, Zhigang / Chang, Chaowen / Guo, Zhimin et al. | 2019
- 269
-
Analysis of dynamic code updating in Android with security perspectiveAysan, Ahmet I. / Sakiz, Fatih / Sen, Sevil et al. | 2019
- 278
-
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theoremSheikhi-Garjan, Maryam / Bahramian, Mojtaba / Doche, Christophe et al. | 2019
- 285
-
Detecting LDoS attack bursts based on queue distributionYue, Meng / Wu, Zhijun / Wang, Jingjie et al. | 2019