default search action
Search dblp for Publications
export results for "toc:db/journals/iet-ifs/iet-ifs6.bht:"
@article{DBLP:journals/iet-ifs/AgrenHJ12, author = {Martin {\AA}gren and Martin Hell and Thomas Johansson}, title = {On hardware-oriented message authentication}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {329--336}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0221}, doi = {10.1049/IET-IFS.2011.0221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AgrenHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AkdemirKS12, author = {Kahraman D. Akdemir and Deniz Karakoyunlu and Berk Sunar}, title = {Non-linear error detection for elliptic curve cryptosystems}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {28--40}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0243}, doi = {10.1049/IET-IFS.2011.0243}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AkdemirKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AlaghbandA12, author = {Mahdi R. Alaghband and Mohammad Reza Aref}, title = {Dynamic and secure key management model for hierarchical heterogeneous sensor networks}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {271--280}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2012.0144}, doi = {10.1049/IET-IFS.2012.0144}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AlaghbandA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AliI12, author = {Qutaiba Ibrahim Ali and S. Iazim}, title = {Design and implementation of an embedded intrusion detection system for wireless applications}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {171--182}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0245}, doi = {10.1049/IET-IFS.2010.0245}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AliI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AstorgaJHH12, author = {Jasone Astorga and Eduardo Jacob and Maider Huarte and Marivi Higuero}, title = {Ladon\({}^{\mbox{1}}\): end-to-end authorisation support for resource-deprived environments}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {93--101}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0259}, doi = {10.1049/IET-IFS.2010.0259}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AstorgaJHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BabaheidarianSA12, author = {Parisa Babaheidarian and Somayeh Salimi and Mohammad Reza Aref}, title = {Simultaneously generating multiple keys in a four-terminal network}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {190--201}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0232}, doi = {10.1049/IET-IFS.2011.0232}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BabaheidarianSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BhattacharyaG12, author = {P. Bhattacharya and S. K. Ghosh}, title = {Analytical framework for measuring network security using exploit dependency graph}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {264--270}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0103}, doi = {10.1049/IET-IFS.2011.0103}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BhattacharyaG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChenL12, author = {Chin{-}Ling Chen and Jyun{-}Jie Liao}, title = {Fair offline digital content transaction system}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {123--130}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0228}, doi = {10.1049/IET-IFS.2010.0228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChiouCLLLY12, author = {Che Wun Chiou and Hung Wei Chang and Wen{-}Yew Liang and Chiou{-}Yng Lee and Jim{-}Min Lin and Yun{-}Chi Yeh}, title = {Low-complexity Gaussian normal basis multiplier over GF(2\({}^{\mbox{m}}\))}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {310--317}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2012.0110}, doi = {10.1049/IET-IFS.2012.0110}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChiouCLLLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChiouCLLLY12a, author = {Che Wun Chiou and Tai{-}Pao Chuang and Shun{-}Shii Lin and Chiou{-}Yng Lee and Jim{-}Min Lin and Yun{-}Chi Yeh}, title = {Palindromic-like representation for Gaussian normal basis multiplier over GF(2\({}^{\mbox{m}}\)) with odd type t}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {318--323}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2012.0200}, doi = {10.1049/IET-IFS.2012.0200}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChiouCLLLY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChouCFCL12, author = {Yao{-}Hsin Chou and Chi{-}Yuan Chen and Rui{-}Kai Fan and Han{-}Chieh Chao and Fang{-}Jhu Lin}, title = {Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {84--92}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0233}, doi = {10.1049/IET-IFS.2011.0233}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChouCFCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChuangCLL12, author = {Tai{-}Pao Chuang and Che Wun Chiou and Shun{-}Shii Lin and Chiou{-}Yng Lee}, title = {Fault-tolerant Gaussian normal basis multiplier over GF(2\({}^{\mbox{m}}\))}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {157--170}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0190}, doi = {10.1049/IET-IFS.2011.0190}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChuangCLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/EpiphaniouMSS12, author = {Gregory Epiphaniou and Carsten Maple and Paul Sant and Ghazanfar Ali Safdar}, title = {Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over {IP} calls}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {141--148}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0213}, doi = {10.1049/IET-IFS.2011.0213}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/EpiphaniouMSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FanGSL12, author = {Haining Fan and Ming Gu and Jiaguang Sun and Kwok{-}Yan Lam}, title = {Obtaining more Karatsuba-like formulae over the binary field}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {14--19}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0114}, doi = {10.1049/IET-IFS.2010.0114}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FanGSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FengKRKSB12, author = {An Feng and Michael Knieser and Maher E. Rizkalla and Brian King and Paul Salama and Francis Bowen}, title = {Embedded system for sensor communication and security}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {111--121}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0073}, doi = {10.1049/IET-IFS.2010.0073}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FengKRKSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GeMZ12, author = {Ai{-}Jun Ge and Chuangui Ma Ma and Zhenfeng Zhang}, title = {Attribute-based signature scheme with constant size signature in the standard model}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {47--54}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0094}, doi = {10.1049/IET-IFS.2011.0094}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GeMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HylaFMP12, author = {Tomasz Hyla and Imed El Fray and Witold Mackow and Jerzy Pejas}, title = {Long-term preservation of digital signatures for multiple groups of related documents}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {219--227}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0344}, doi = {10.1049/IET-IFS.2011.0344}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HylaFMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KaoZSP12, author = {Yung{-}Wei Kao and Xin Zhang and Ahren Studer and Adrian Perrig}, title = {Mobile encryption for laptop data protection {(MELP)}}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {291--298}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0347}, doi = {10.1049/IET-IFS.2011.0347}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KaoZSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Kim12, author = {Iksu Kim}, title = {Keypad against brute force attacks on smartphones}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {71--76}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0212}, doi = {10.1049/IET-IFS.2010.0212}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Kim12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KimK12, author = {Iksu Kim and Myungho Kim}, title = {Agent-based honeynet framework for protecting servers in campus networks}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {202--211}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0154}, doi = {10.1049/IET-IFS.2011.0154}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KimK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiG12, author = {Zhijun Li and Guang Gong}, title = {HB\({}^{\mbox{C}}\) entity authentication for low-cost pervasive devices}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {212--218}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0052}, doi = {10.1049/IET-IFS.2011.0052}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiuKWC12, author = {Xiaobei Liu and Soo Ngee Koh and Xin{-}Wen Wu and Chee{-}Cheon Chui}, title = {Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {183--189}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0215}, doi = {10.1049/IET-IFS.2011.0215}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiuKWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LuWFK12, author = {Jiqiang Lu and Yongzhuang Wei and Pierre{-}Alain Fouque and Jongsung Kim}, title = {Cryptanalysis of reduced versions of the Camellia block cipher}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {228--238}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0342}, doi = {10.1049/IET-IFS.2011.0342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LuWFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MarchangD12, author = {Ningrinla Marchang and Raja Datta}, title = {Light-weight trust-based routing protocol for mobile ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {77--83}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0160}, doi = {10.1049/IET-IFS.2010.0160}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MarchangD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MihaljevicGPI12, author = {Miodrag J. Mihaljevic and Sugata Gangopadhyay and Goutam Paul and Hideki Imai}, title = {Internal state recovery of grain-v1 employing normality order of the filter function}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {55--64}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0107}, doi = {10.1049/IET-IFS.2011.0107}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MihaljevicGPI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng12, author = {Kun Peng}, title = {Attack against a batch zero-knowledge proof system}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {1--5}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0290}, doi = {10.1049/IET-IFS.2011.0290}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng12a, author = {Kun Peng}, title = {Critical survey of existing publicly verifiable secret sharing schemes}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {249--257}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0201}, doi = {10.1049/IET-IFS.2011.0201}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SunH012, author = {Changhua Sun and Chengchen Hu and Bin Liu}, title = {SACK\({}^{\mbox{2}}\): effective {SYN} flood detection against skillful spoofs}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {149--156}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0158}, doi = {10.1049/IET-IFS.2010.0158}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SunH012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Tian12, author = {Haibo Tian}, title = {Deniable message transmission authenticator based on weak signature schemes}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {258--263}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0139}, doi = {10.1049/IET-IFS.2011.0139}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Tian12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VenkataramanPR12, author = {Revathi Venkataraman and Mullur Pushpalatha and T. Rama Rao}, title = {Regression-based trust model for mobile ad hoc networks}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {3}, pages = {131--140}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0234}, doi = {10.1049/IET-IFS.2011.0234}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VenkataramanPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangCCL12, author = {Jenq{-}Haur Wang and Hung Wei Chang and Che Wun Chiou and Wen{-}Yew Liang}, title = {Low-complexity design of bit-parallel dual-basis multiplier over GF(2\({}^{\mbox{m}}\))}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {324--328}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2012.0210}, doi = {10.1049/IET-IFS.2012.0210}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangCCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangJK12, author = {Qichun Wang and Thomas Johansson and Haibin Kan}, title = {Some results on fast algebraic attacks and higher-order non-linearities}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {41--46}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0090}, doi = {10.1049/IET-IFS.2011.0090}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangQ12, author = {Huaqun Wang and Bo Qin}, title = {Improved one-to-many authentication scheme for access control in pay-TV systems}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {281--290}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0281}, doi = {10.1049/IET-IFS.2011.0281}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangZXQ12, author = {Huaqun Wang and Yi{-}Chun Zhang and Hu Xiong and Bo Qin}, title = {Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {20--27}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0252}, doi = {10.1049/IET-IFS.2010.0252}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangZXQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WuS12, author = {Xiaotian Wu and Wei Sun}, title = {Visual secret sharing for general access structures by random grids}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {299--309}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2012.0046}, doi = {10.1049/IET-IFS.2012.0046}, timestamp = {Mon, 05 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WuS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Xie12, author = {Qi Xie}, title = {Provably secure convertible multi-authenticated encryption scheme}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {65--70}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0162}, doi = {10.1049/IET-IFS.2011.0162}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Xie12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YangGLJM12, author = {Y. Yang and J. Gu and C. Lv and Qi Jiang and W. Ma}, title = {Security analysis of Kulseng et al.'s mutual authentication protocol for {RFID} systems}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {239--248}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0230}, doi = {10.1049/IET-IFS.2010.0230}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YangGLJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/YuMWXY12, author = {Yong Yu and Yi Mu and Guilin Wang and Qi Xia and Bo Yang}, title = {Improved certificateless signature scheme provably secure in the standard model}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {2}, pages = {102--110}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0004}, doi = {10.1049/IET-IFS.2011.0004}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/YuMWXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhengMCT12, author = {Gang Zheng and Hengtai Ma and C. Cheng and Y.{-}C. Tu}, title = {Design and logical analysis on the access authentication scheme for satellite mobile communication networks}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {6--13}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2010.0233}, doi = {10.1049/IET-IFS.2010.0233}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhengMCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.