Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iet-ifs/iet-ifs3.bht:"
@article{DBLP:journals/iet-ifs/AhmadiE09, author = {Hadi Ahmadi and Taraneh Eghlidos}, title = {Heuristic guess-and-determine attacks on stream ciphers}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {2}, pages = {66--73}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0013}, doi = {10.1049/IET-IFS.2008.0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AhmadiE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AlamGMMCS09, author = {Monjur Alam and Santosh Ghosh and M. J. Mohan and Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury and Indranil Sengupta}, title = {Effect of glitches against masked {AES} S-box implementation and countermeasure}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {1}, pages = {34--44}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs:20080041}, doi = {10.1049/IET-IFS:20080041}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AlamGMMCS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BagheriHKNS09, author = {Nasour Bagheri and Matt Henricksen and Lars R. Knudsen and Majid Naderi and B. Sadeghyian}, title = {Cryptanalysis of an iterated halving-based hash function: {CRUSH}}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {129--138}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2009.0055}, doi = {10.1049/IET-IFS.2009.0055}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BagheriHKNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChiouLL09, author = {Che Wun Chiou and Chiou{-}Yng Lee and Jim{-}Min Lin}, title = {Unified dual-field multiplier in {GF(P)} and GF(2\({}^{\mbox{k}}\))}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {2}, pages = {45--52}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2007.0030}, doi = {10.1049/IET-IFS.2007.0030}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChiouLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChowY09, author = {Sherman S. M. Chow and Wun{-}She Yap}, title = {Partial decryption attacks in security-mediated certificateless encryption}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {148--151}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2009.0028}, doi = {10.1049/IET-IFS.2009.0028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChowY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FanH09, author = {Haining Fan and Masud Anwarul Hasan}, title = {Alternative to the karatsuba algorithm for software implementations of GF(2\({}_{\mbox{n}}\)) multiplications}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {2}, pages = {60--65}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2007.0132}, doi = {10.1049/IET-IFS.2007.0132}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FanH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FarhadianA09, author = {Ameneh Farhadian and Mohammad Reza Aref}, title = {Efficient method for simplifying and approximating the s-boxes based on power functions}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {3}, pages = {114--118}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0116}, doi = {10.1049/IET-IFS.2008.0116}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FarhadianA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KiayiasZ09, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Hidden identity-based signatures}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {3}, pages = {119--127}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2007.0151}, doi = {10.1049/IET-IFS.2007.0151}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KiayiasZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LeeCC09, author = {Jung{-}San Lee and Chi{-}Shiang Chan and Chin{-}Chen Chang}, title = {Non-iterative privacy preservation for online lotteries}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {139--147}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0104}, doi = {10.1049/IET-IFS.2008.0104}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LeeCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Saad09, author = {Saad M. Saad}, title = {Design of a robust and secure digital signature scheme for image authentication over wireless channels}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {1}, pages = {1--8}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs:20070112}, doi = {10.1049/IET-IFS:20070112}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Saad09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SeehusenS09, author = {Fredrik Seehusen and Ketil St{\o}len}, title = {Information flow security, abstraction and composition}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {1}, pages = {9--33}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs:20080069}, doi = {10.1049/IET-IFS:20080069}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SeehusenS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShahandashtiS09, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini}, title = {Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {152--176}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2009.0036}, doi = {10.1049/IET-IFS.2009.0036}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShahandashtiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ToahchoodeeR09, author = {Manachai Toahchoodee and Indrakshi Ray}, title = {Using alloy to analyse a spatio-temporal access control model supporting delegation}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {3}, pages = {75--113}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0074}, doi = {10.1049/IET-IFS.2008.0074}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ToahchoodeeR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangH09, author = {Baocang Wang and Yupu Hu}, title = {Signature scheme based on the root extraction problem over braid groups}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {2}, pages = {53--59}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0090}, doi = {10.1049/IET-IFS.2008.0090}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.