


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 697 matches
- 2023
- Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova
, André Schrottenloher, Fang Song:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. IET Inf. Secur. 17(2): 171-209 (2023) - Zhixiong Chen
, Vladimir Edemskiy
, Zhihua Niu
, Yuqi Sang
:
Arithmetic correlation of binary half- ℓ -sequences. IET Inf. Secur. 17(2): 289-293 (2023) - Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara
:
The poor usability of OpenLDAP Access Control Lists. IET Inf. Secur. 17(1): 89-101 (2023) - Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang:
Robust private information retrieval for low encoding/decoding complexity distributed storage. IET Inf. Secur. 17(2): 255-268 (2023) - Valeh Farzaliyev, Jan Willemson
, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. IET Inf. Secur. 17(1): 18-34 (2023) - Yasuhiko Ikematsu
, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2): 210-226 (2023) - Faiz Ul Islam
, Guangjie Liu
, Weiwei Liu
, Qazi Mazhar ul Haq
:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. IET Inf. Secur. 17(2): 294-308 (2023) - Péter Kutas
, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. IET Inf. Secur. 17(2): 161-170 (2023) - Yongseong Lee
, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. IET Inf. Secur. 17(1): 66-79 (2023) - Jongheon Lee
, Sokjoon Lee, You-Seok Lee, Dooho Choi
:
T-depth reduction method for efficient SHA-256 quantum circuit construction. IET Inf. Secur. 17(1): 46-65 (2023) - Seonghyuck Lim
, Dong-Guk Han
:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. IET Inf. Secur. 17(1): 80-88 (2023) - Jun Liu
, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - Ayoub Otmani, Christophe Petit
, Mehdi Tibouchi
:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. IET Inf. Secur. 17(2): 159-160 (2023) - Jong Hwan Park
:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). IET Inf. Secur. 17(1): 1-2 (2023) - Peixin Ren
, Xiaozhuo Gu, Ziliang Wang:
Efficient module learning with errors-based post-quantum password-authenticated key exchange. IET Inf. Secur. 17(1): 3-17 (2023) - Junyu Ren
, Haibin Wan, Chaoyang Zhu, Tuanfa Qin:
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things. IET Inf. Secur. 17(2): 269-288 (2023) - Rentaro Shiba
, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. IET Inf. Secur. 17(1): 131-146 (2023) - Yifeng Wang, Yuanbo Guo, Chen Fang:
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders. IET Inf. Secur. 17(2): 244-254 (2023) - Anyu Wang
, Dianyan Xiao, Yang Yu
:
Lattice-based cryptosystems in standardisation processes: A survey. IET Inf. Secur. 17(2): 227-243 (2023) - Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. IET Inf. Secur. 17(1): 118-130 (2023) - Zhe Xia
, Yu Yang, Fuyou Miao:
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'. IET Inf. Secur. 17(2): 309-314 (2023) - Kazuki Yamamura, Yuntao Wang
, Eiichiro Fujisaki:
Improved lattice enumeration algorithms by primal and dual reordering methods. IET Inf. Secur. 17(1): 35-45 (2023) - Zhengbin Zhu
, Qinrang Liu, Dongpei Liu, Chenyang Ge, Chong Wang:
MHSDN: A Hierarchical Software Defined Network Reliability Framework design. IET Inf. Secur. 17(1): 102-117 (2023) - 2022
- Ali F. Al-Qahtani, Stefano Cresci
:
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. IET Inf. Secur. 16(5): 324-345 (2022) - Muhammad Arif, Shermin Shamsudheen, F. Ajesh, Guojun Wang
, Jianer Chen:
AI bot to detect fake COVID-19 vaccine certificate. IET Inf. Secur. 16(5): 362-372 (2022) - Jiongyi Chen
, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang:
Authorisation inconsistency in IoT third-party integration. IET Inf. Secur. 16(2): 133-143 (2022) - Xiaoli Dong
, Yongzhuang Wei:
New attacks against reduced Rijndael-160. IET Inf. Secur. 16(1): 28-40 (2022) - Uddipana Dowerah
, Srinivasan Krishnaswamy
:
Towards an efficient LWE-based fully homomorphic encryption scheme. IET Inf. Secur. 16(4): 235-252 (2022) - Jiahui Gao
, Chetan Surana, Ni Trieu:
Secure contact tracing platform from simplest private set intersection cardinality. IET Inf. Secur. 16(5): 346-361 (2022) - José Antonio Gómez-Hernández
, Raúl Sánchez-Fernández, Pedro García-Teodoro
:
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Inf. Secur. 16(1): 64-74 (2022)
skipping 667 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-05-29 02:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint