IET Information Security
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 519
-
Image-based CAPTCHAs based on neural style transferCheng, Zhouhang / Gao, Haichang / Liu, Zhongyu et al. | 2019
- 530
-
Fair and private rewarding in a coalitional game of cybersecurity information sharingVakilinia, Iman / Sengupta, Shamik et al. | 2019
- 541
-
Dynamical model for individual defence against cyber epidemic attacksYan, Dingyu / Liu, Feng / Zhang, Yaqin et al. | 2019
- 552
-
Advanced encryption standard based on key dependent S-Box cubeSeghier, Athmane / Li, Jianxin / Sun, Da Zhi et al. | 2019
- 559
-
Guess and determine cryptanalysis with variable sampling and its applicationsHodžić, Samir / Pasalic, Enes / Wei, Yongzhuang et al. | 2019
- 570
-
Transforming malicious code to ROP gadgets for antivirus evasionNtantogian, Christoforos / Poulios, Georgios / Karopoulos, Georgios et al. | 2019
- 579
-
Witness indistinguishability and witness hiding against quantum attacksXie, Huiqin / Yang, Li et al. | 2019
- 591
-
Cryptanalysis for reduced round Salsa and ChaCha: revisitedDeepthi, Kakumani K.C. / Singh, Kunwar et al. | 2019
- 603
-
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVsDalai, Deepak Kumar / Maitra, Subhamoy / Pal, Santu et al. | 2019
- 614
-
Division polynomial-based elliptic curve scalar multiplication revisitedSubramanyaRao, SrinivasaRao / Hu, Zhi / Zhao, Chang-An et al. | 2019
- 618
-
Multi-key homomorphic authenticatorsFiore, Dario / Mitrokotsa, Aikaterini / Nizzardo, Luca et al. | 2019
- 639
-
Fully homomorphic encryption based on the ring learning with rounding problemLuo, Fucai / Wang, Fuqun / Wang, Kunpeng et al. | 2019
- 649
-
Enhanced secure data backup scheme using multi-factor authenticationHu, Huidan / Lin, Changlu / Chang, Chin-Chen et al. | 2019
- 659
-
Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weightingAli, Waleed / Ahmed, Adel A. et al. | 2019
- 670
-
Leakage-resilient lattice-based partially blind signaturesPapachristoudis, Dimitrios / Hristu-Varsakelis, Dimitrios / Baldimtsi, Foteini et al. | 2019
- 685
-
Revisiting BGG+14 ABE with weakness analysisHu, Yupu / Zhang, Shanshan / Chen, Jiangshan et al. | 2019
- 692
-
Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacksAshok, Prathiba / Vettuvanam Somasundaram, Kanchana Bhaaskaran et al. | 2019
- 703
-
Dynamic asymmetric group key agreement protocol with traitor traceabilityTeng, Jikai / Ma, Hongyang et al. | 2019