长垣产业园区科技文献服务平台

期刊


ISSN1751-8709
刊名IET Information Security
参考译名IET信息安全
收藏年代2007~2013

关联期刊参考译名收藏年代
IEE Proceedings英国电气工程师学会志:信息安全2006~2007


全部

2007 2008 2009 2010 2011 2012
2013

2012, vol.6, no.1 2012, vol.6, no.2 2012, vol.6, no.3 2012, vol.6, no.4

题名作者出版年年卷期
Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systemsY. Yang; J. Gu; C. Lv; Q. Jiang; W. Ma20122012, vol.6, no.4
Critical survey of existing publicly verifiable secret sharing schemesK. Peng20122012, vol.6, no.4
Deniable message transmission authenticator based on weak signature schemesH. Tian20122012, vol.6, no.4
Analytical framework for measuring network security using exploit dependency graphP. Bhattacharya; S. K. Ghosh20122012, vol.6, no.4
Dynamic and secure key management model for hierarchical heterogeneous sensor networksM. R. Alagheband; M. R. Aref20122012, vol.6, no.4
Improved one-to-many authentication scheme for access control in pay-TV systemsH. Wang; B. Qin20122012, vol.6, no.4
Mobile encryption for laptop data protection (MELP)Y. W. Kao; X. Zhang; A. Studer; A. Perrig20122012, vol.6, no.4
Visual secret sharing for general access structures by random gridsX. Wu; W. Sun20122012, vol.6, no.4
Low-complexity Gaussian normal basis multiplier over GF(2~m)C. W. Chiou; H. W. Chang; W. Y. Liang; C. Y. Lee; J. M. Lin; Y. C. Yeh20122012, vol.6, no.4
Palindromic-like representation for Gaussian normal basis multiplier over GF(2~m) with odd type tC. W. Chiou; T. P. Chuang; S. S. Lin; C. Y. Lee; J. M. Lin; Y. C. Yeh20122012, vol.6, no.4
123