default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 724 matches
- 2023
- Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan:
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. IET Inf. Secur. 17(3): 505-517 (2023) - Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. IET Inf. Secur. 17(2): 171-209 (2023) - Zhixiong Chen, Vladimir Edemskiy, Zhihua Niu, Yuqi Sang:
Arithmetic correlation of binary half- ℓ -sequences. IET Inf. Secur. 17(2): 289-293 (2023) - Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara:
The poor usability of OpenLDAP Access Control Lists. IET Inf. Secur. 17(1): 89-101 (2023) - Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang:
Robust private information retrieval for low encoding/decoding complexity distributed storage. IET Inf. Secur. 17(2): 255-268 (2023) - Ngoc-Tuan Do, Van-Phuc Hoang, Van-Sang Doan, Cong-Kha Pham:
On the performance of non-profiled side channel attacks based on deep learning techniques. IET Inf. Secur. 17(3): 377-393 (2023) - Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. IET Inf. Secur. 17(1): 18-34 (2023) - Munir Geden, Kasper Rasmussen:
Hardware-assisted remote attestation design for critical embedded systems. IET Inf. Secur. 17(3): 518-533 (2023) - Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, Félix J. García Clemente:
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. IET Inf. Secur. 17(4): 553-566 (2023) - Liukun He, Liang-Min Wang, Keyang Cheng, Yifan Xu:
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling. IET Inf. Secur. 17(4): 598-615 (2023) - Kexin Hu, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han:
An optimisation for a two-round good-case latency protocol. IET Inf. Secur. 17(4): 664-680 (2023) - Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2): 210-226 (2023) - Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. IET Inf. Secur. 17(3): 468-484 (2023) - Faiz Ul Islam, Guangjie Liu, Weiwei Liu, Qazi Mazhar ul Haq:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. IET Inf. Secur. 17(2): 294-308 (2023) - Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. IET Inf. Secur. 17(4): 567-581 (2023) - Péter Kutas, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. IET Inf. Secur. 17(2): 161-170 (2023) - Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. IET Inf. Secur. 17(1): 66-79 (2023) - Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi:
T-depth reduction method for efficient SHA-256 quantum circuit construction. IET Inf. Secur. 17(1): 46-65 (2023) - Tong Li, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. IET Inf. Secur. 17(4): 703-726 (2023) - Degang Li, Yang Yang, Guang Zeng:
Search framework for neutral bits and boomerangs in SHA-1 collision attacks. IET Inf. Secur. 17(4): 647-663 (2023) - Seonghyuck Lim, Dong-Guk Han:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. IET Inf. Secur. 17(1): 80-88 (2023) - Dongdong Lin, Manman Li, Zezhou Hou, Shaozhen Chen:
Conditional differential analysis on the KATAN ciphers based on deep learning. IET Inf. Secur. 17(3): 347-359 (2023) - Jiajie Liu, Bing Sun, Chao Li:
Design and cryptanalysis of a new iterative structure. IET Inf. Secur. 17(3): 335-346 (2023) - Jiamei Liu, Lin Tan, Hong Xu:
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC. IET Inf. Secur. 17(3): 407-422 (2023) - Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - Zhangjun Ma, Manman Li, Shaozhen Chen:
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search. IET Inf. Secur. 17(3): 534-543 (2023) - Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi, Saeed Aghapour:
On the security of 'an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller'. IET Inf. Secur. 17(3): 544-551 (2023) - Ayoub Otmani, Christophe Petit, Mehdi Tibouchi:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. IET Inf. Secur. 17(2): 159-160 (2023) - Jong Hwan Park:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). IET Inf. Secur. 17(1): 1-2 (2023) - Junling Pei, Lusheng Chen:
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. IET Inf. Secur. 17(3): 394-406 (2023)
skipping 694 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-08 11:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint