IET Information Security
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 613
-
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulatorNakanishi, Toru / Kanatani, Takeshi et al. | 2020
- 625
-
Pairing free identity based aggregate signcryption schemeAbouelkheir, Eman / El-sherbiny, Shamia et al. | 2020
- 633
-
Efficient elliptic curve Diffie-Hellman computation at the 256-bit security levelNath, Kaushik / Sarkar, Palash et al. | 2020
- 641
-
More realistic analysis of mass surveillance – security in multi-surveillant settingsLi, Geng / Liu, Jianwei / Zhang, Zongyang et al. | 2020
- 654
-
Further study on constructing bent functions outside the completed Maiorana–McFarland classLiu, Shishi / Zhang, Fengrong / Pasalic, Enes et al. | 2020
- 661
-
Post-quantum protocol for computing set intersection cardinality with linear complexityDebnath, Sumit Kumar / Stănică, Pantelimon / Choudhury, Tanmay et al. | 2020
- 670
-
SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearbyAlex, Sona / Pattathil, Deepthi P / Kakkanattu Jagalchandran, Dhanaraj et al. | 2020
- 683
-
C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web trafficDandıl, Emre et al. | 2020
- 694
-
Economic feasibility study for stealthy socialbot network establishmentHosseini Moghaddam, Samaneh / Abbaspour, Maghsoud et al. | 2020
- 704
-
P2 KASE A2—privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegationPadhya, Mukti / Jinwala, Devesh C. et al. | 2020
- 724
-
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptographyFeng, Qi / He, Debiao / Wang, Huaqun et al. | 2020
- 733
-
Achieving secure and convenient WLAN sharing in personalYan, Zhicheng / Yang, Chao / You, Wei et al. | 2020
- 745
-
Statistical watermarking approach for 3D mesh using local curvature estimationSharma, Neha / Panda, Jeebananda et al. | 2020
- 754
-
Non-stochastic hypothesis testing for privacyFarokhi, Farhad et al. | 2020
- 764
-
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie–Hellman problemZeng, Runzhi / Wang, Libin et al. | 2020
- 773
-
GUIM-SMD: guilty user identification model using summation matrix-based distributionGupta, Ishu / Singh, Ashutosh Kumar et al. | 2020
- 783
-
New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystemYang, Jing / Fu, Fang-Wei et al. | 2020