default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2022
- Ali F. Al-Qahtani, Stefano Cresci:
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. IET Inf. Secur. 16(5): 324-345 (2022) - Muhammad Arif, Shermin Shamsudheen, F. Ajesh, Guojun Wang, Jianer Chen:
AI bot to detect fake COVID-19 vaccine certificate. IET Inf. Secur. 16(5): 362-372 (2022) - Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang:
Authorisation inconsistency in IoT third-party integration. IET Inf. Secur. 16(2): 133-143 (2022) - Xiaoli Dong, Yongzhuang Wei:
New attacks against reduced Rijndael-160. IET Inf. Secur. 16(1): 28-40 (2022) - Uddipana Dowerah, Srinivasan Krishnaswamy:
Towards an efficient LWE-based fully homomorphic encryption scheme. IET Inf. Secur. 16(4): 235-252 (2022) - Jiahui Gao, Chetan Surana, Ni Trieu:
Secure contact tracing platform from simplest private set intersection cardinality. IET Inf. Secur. 16(5): 346-361 (2022) - José Antonio Gómez-Hernández, Raúl Sánchez-Fernández, Pedro García-Teodoro:
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. IET Inf. Secur. 16(1): 64-74 (2022) - Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022) - Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching attacks on Romulus-M. IET Inf. Secur. 16(6): 459-469 (2022) - Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. IET Inf. Secur. 16(6): 401-416 (2022) - Akiko Inoue:
Beyond full-bit secure authenticated encryption without input-length limitation. IET Inf. Secur. 16(4): 253-261 (2022) - Huiwen Jia, Yupu Hu, Chunming Tang:
Lattice-based hash-and-sign signatures using approximate trapdoor, revisited. IET Inf. Secur. 16(1): 41-50 (2022) - Jiseung Kim, Changmin Lee:
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map. IET Inf. Secur. 16(3): 208-219 (2022) - Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo:
An optimal defensive deception framework for the container-based cloud with deep reinforcement learning. IET Inf. Secur. 16(3): 178-192 (2022) - Shuai Liu, Jie Guan, Bin Hu:
Fault attacks on authenticated encryption modes for GIFT. IET Inf. Secur. 16(1): 51-63 (2022) - Yibing Liu, Lijun Huo, Gang Zhou:
TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks. IET Inf. Secur. 16(3): 193-207 (2022) - Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
On the upper bound of squared correlation of SIMON-like functions and its applications. IET Inf. Secur. 16(3): 220-234 (2022) - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue:
LDoS attack detection method based on traffic classification prediction. IET Inf. Secur. 16(2): 86-96 (2022) - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved rotational-XOR cryptanalysis of Simon-like block ciphers. IET Inf. Secur. 16(4): 282-300 (2022) - Maria Chiara Molteni, Jürgen Pulkus, Vittorio Zaccaria:
On robust strong-non-interferent low-latency multiplications. IET Inf. Secur. 16(2): 127-132 (2022) - Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo:
A deep learning-based attack on text CAPTCHAs by using object detection techniques. IET Inf. Secur. 16(2): 97-110 (2022) - Roberto Di Pietro, Ni Trieu, Vincenzo Iovino:
COVID-19 and cybersecurity. IET Inf. Secur. 16(5): 321-323 (2022) - Adrián Ranea, Vincent Rijmen:
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA). IET Inf. Secur. 16(6): 470-481 (2022) - Mo Shaohui, Gulanbaier Tuerhong, Mairidan Wushouer, Tuergen Yibulayin:
PCA mix-based Hotelling's T2 multivariate control charts for intrusion detection system. IET Inf. Secur. 16(3): 161-177 (2022) - Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He:
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(5): 390-400 (2022) - Rentaro Shiba, Kosei Sakamoto, Takanori Isobe:
Efficient constructions for large-state block ciphers based on AES New Instructions. IET Inf. Secur. 16(3): 145-160 (2022) - Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022) - Lisha Shuai, Jiamin Zhang, Yu Cao, Min Zhang, Xiaolong Yang:
R-DP: A risk-adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things. IET Inf. Secur. 16(5): 373-389 (2022) - Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang:
Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification. IET Inf. Secur. 16(6): 442-458 (2022)
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 11:55 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint