Search dblp for Publications

export results for "toc:db/journals/iet-ifs/iet-ifs3.bht:"

 download as .bib file

@article{DBLP:journals/iet-ifs/AhmadiE09,
  author       = {Hadi Ahmadi and
                  Taraneh Eghlidos},
  title        = {Heuristic guess-and-determine attacks on stream ciphers},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {66--73},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0013},
  doi          = {10.1049/IET-IFS.2008.0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AhmadiE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AlamGMMCS09,
  author       = {Monjur Alam and
                  Santosh Ghosh and
                  M. J. Mohan and
                  Debdeep Mukhopadhyay and
                  Dipanwita Roy Chowdhury and
                  Indranil Sengupta},
  title        = {Effect of glitches against masked {AES} S-box implementation and countermeasure},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {34--44},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs:20080041},
  doi          = {10.1049/IET-IFS:20080041},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AlamGMMCS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BagheriHKNS09,
  author       = {Nasour Bagheri and
                  Matt Henricksen and
                  Lars R. Knudsen and
                  Majid Naderi and
                  B. Sadeghyian},
  title        = {Cryptanalysis of an iterated halving-based hash function: {CRUSH}},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {129--138},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0055},
  doi          = {10.1049/IET-IFS.2009.0055},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BagheriHKNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChiouLL09,
  author       = {Che Wun Chiou and
                  Chiou{-}Yng Lee and
                  Jim{-}Min Lin},
  title        = {Unified dual-field multiplier in {GF(P)} and GF(2\({}^{\mbox{k}}\))},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {45--52},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2007.0030},
  doi          = {10.1049/IET-IFS.2007.0030},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChiouLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChowY09,
  author       = {Sherman S. M. Chow and
                  Wun{-}She Yap},
  title        = {Partial decryption attacks in security-mediated certificateless encryption},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {148--151},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0028},
  doi          = {10.1049/IET-IFS.2009.0028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChowY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FanH09,
  author       = {Haining Fan and
                  Masud Anwarul Hasan},
  title        = {Alternative to the karatsuba algorithm for software implementations
                  of GF(2\({}_{\mbox{n}}\)) multiplications},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {60--65},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2007.0132},
  doi          = {10.1049/IET-IFS.2007.0132},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FanH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FarhadianA09,
  author       = {Ameneh Farhadian and
                  Mohammad Reza Aref},
  title        = {Efficient method for simplifying and approximating the s-boxes based
                  on power functions},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {114--118},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0116},
  doi          = {10.1049/IET-IFS.2008.0116},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FarhadianA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KiayiasZ09,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Hidden identity-based signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {119--127},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2007.0151},
  doi          = {10.1049/IET-IFS.2007.0151},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KiayiasZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LeeCC09,
  author       = {Jung{-}San Lee and
                  Chi{-}Shiang Chan and
                  Chin{-}Chen Chang},
  title        = {Non-iterative privacy preservation for online lotteries},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {139--147},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0104},
  doi          = {10.1049/IET-IFS.2008.0104},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LeeCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Saad09,
  author       = {Saad M. Saad},
  title        = {Design of a robust and secure digital signature scheme for image authentication
                  over wireless channels},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {1--8},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs:20070112},
  doi          = {10.1049/IET-IFS:20070112},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Saad09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SeehusenS09,
  author       = {Fredrik Seehusen and
                  Ketil St{\o}len},
  title        = {Information flow security, abstraction and composition},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {9--33},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs:20080069},
  doi          = {10.1049/IET-IFS:20080069},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SeehusenS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShahandashtiS09,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini},
  title        = {Generic constructions for universal designated-verifier signatures
                  and identitybased signatures from standard signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {152--176},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0036},
  doi          = {10.1049/IET-IFS.2009.0036},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShahandashtiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ToahchoodeeR09,
  author       = {Manachai Toahchoodee and
                  Indrakshi Ray},
  title        = {Using alloy to analyse a spatio-temporal access control model supporting
                  delegation},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {75--113},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0074},
  doi          = {10.1049/IET-IFS.2008.0074},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ToahchoodeeR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangH09,
  author       = {Baocang Wang and
                  Yupu Hu},
  title        = {Signature scheme based on the root extraction problem over braid groups},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {53--59},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0090},
  doi          = {10.1049/IET-IFS.2008.0090},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics