Search dblp for Publications

export results for "toc:db/journals/iet-ifs/iet-ifs6.bht:"

 download as .bib file

@article{DBLP:journals/iet-ifs/AgrenHJ12,
  author       = {Martin {\AA}gren and
                  Martin Hell and
                  Thomas Johansson},
  title        = {On hardware-oriented message authentication},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {329--336},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0221},
  doi          = {10.1049/IET-IFS.2011.0221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AgrenHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AkdemirKS12,
  author       = {Kahraman D. Akdemir and
                  Deniz Karakoyunlu and
                  Berk Sunar},
  title        = {Non-linear error detection for elliptic curve cryptosystems},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {28--40},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0243},
  doi          = {10.1049/IET-IFS.2011.0243},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AkdemirKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AlaghbandA12,
  author       = {Mahdi R. Alaghband and
                  Mohammad Reza Aref},
  title        = {Dynamic and secure key management model for hierarchical heterogeneous
                  sensor networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {271--280},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0144},
  doi          = {10.1049/IET-IFS.2012.0144},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AlaghbandA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AliI12,
  author       = {Qutaiba Ibrahim Ali and
                  S. Iazim},
  title        = {Design and implementation of an embedded intrusion detection system
                  for wireless applications},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {171--182},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0245},
  doi          = {10.1049/IET-IFS.2010.0245},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AliI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AstorgaJHH12,
  author       = {Jasone Astorga and
                  Eduardo Jacob and
                  Maider Huarte and
                  Marivi Higuero},
  title        = {Ladon\({}^{\mbox{1}}\): end-to-end authorisation support for resource-deprived
                  environments},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {93--101},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0259},
  doi          = {10.1049/IET-IFS.2010.0259},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AstorgaJHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BabaheidarianSA12,
  author       = {Parisa Babaheidarian and
                  Somayeh Salimi and
                  Mohammad Reza Aref},
  title        = {Simultaneously generating multiple keys in a four-terminal network},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {190--201},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0232},
  doi          = {10.1049/IET-IFS.2011.0232},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BabaheidarianSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BhattacharyaG12,
  author       = {P. Bhattacharya and
                  S. K. Ghosh},
  title        = {Analytical framework for measuring network security using exploit
                  dependency graph},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {264--270},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0103},
  doi          = {10.1049/IET-IFS.2011.0103},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BhattacharyaG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChenL12,
  author       = {Chin{-}Ling Chen and
                  Jyun{-}Jie Liao},
  title        = {Fair offline digital content transaction system},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {123--130},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0228},
  doi          = {10.1049/IET-IFS.2010.0228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChiouCLLLY12,
  author       = {Che Wun Chiou and
                  Hung Wei Chang and
                  Wen{-}Yew Liang and
                  Chiou{-}Yng Lee and
                  Jim{-}Min Lin and
                  Yun{-}Chi Yeh},
  title        = {Low-complexity Gaussian normal basis multiplier over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {310--317},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0110},
  doi          = {10.1049/IET-IFS.2012.0110},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChiouCLLLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChiouCLLLY12a,
  author       = {Che Wun Chiou and
                  Tai{-}Pao Chuang and
                  Shun{-}Shii Lin and
                  Chiou{-}Yng Lee and
                  Jim{-}Min Lin and
                  Yun{-}Chi Yeh},
  title        = {Palindromic-like representation for Gaussian normal basis multiplier
                  over GF(2\({}^{\mbox{m}}\)) with odd type t},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {318--323},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0200},
  doi          = {10.1049/IET-IFS.2012.0200},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChiouCLLLY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChouCFCL12,
  author       = {Yao{-}Hsin Chou and
                  Chi{-}Yuan Chen and
                  Rui{-}Kai Fan and
                  Han{-}Chieh Chao and
                  Fang{-}Jhu Lin},
  title        = {Enhanced multiparty quantum secret sharing of classical messages by
                  using entanglement swapping},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {84--92},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0233},
  doi          = {10.1049/IET-IFS.2011.0233},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChouCFCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChuangCLL12,
  author       = {Tai{-}Pao Chuang and
                  Che Wun Chiou and
                  Shun{-}Shii Lin and
                  Chiou{-}Yng Lee},
  title        = {Fault-tolerant Gaussian normal basis multiplier over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {157--170},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0190},
  doi          = {10.1049/IET-IFS.2011.0190},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChuangCLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/EpiphaniouMSS12,
  author       = {Gregory Epiphaniou and
                  Carsten Maple and
                  Paul Sant and
                  Ghazanfar Ali Safdar},
  title        = {Effects of iterative block ciphers on quality of experience for Internet
                  Protocol Security enabled voice over {IP} calls},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {141--148},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0213},
  doi          = {10.1049/IET-IFS.2011.0213},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/EpiphaniouMSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FanGSL12,
  author       = {Haining Fan and
                  Ming Gu and
                  Jiaguang Sun and
                  Kwok{-}Yan Lam},
  title        = {Obtaining more Karatsuba-like formulae over the binary field},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {14--19},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0114},
  doi          = {10.1049/IET-IFS.2010.0114},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FanGSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FengKRKSB12,
  author       = {An Feng and
                  Michael Knieser and
                  Maher E. Rizkalla and
                  Brian King and
                  Paul Salama and
                  Francis Bowen},
  title        = {Embedded system for sensor communication and security},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {111--121},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0073},
  doi          = {10.1049/IET-IFS.2010.0073},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FengKRKSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GeMZ12,
  author       = {Ai{-}Jun Ge and
                  Chuangui Ma Ma and
                  Zhenfeng Zhang},
  title        = {Attribute-based signature scheme with constant size signature in the
                  standard model},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {47--54},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0094},
  doi          = {10.1049/IET-IFS.2011.0094},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GeMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HylaFMP12,
  author       = {Tomasz Hyla and
                  Imed El Fray and
                  Witold Mackow and
                  Jerzy Pejas},
  title        = {Long-term preservation of digital signatures for multiple groups of
                  related documents},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {219--227},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0344},
  doi          = {10.1049/IET-IFS.2011.0344},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HylaFMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KaoZSP12,
  author       = {Yung{-}Wei Kao and
                  Xin Zhang and
                  Ahren Studer and
                  Adrian Perrig},
  title        = {Mobile encryption for laptop data protection {(MELP)}},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {291--298},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0347},
  doi          = {10.1049/IET-IFS.2011.0347},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KaoZSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Kim12,
  author       = {Iksu Kim},
  title        = {Keypad against brute force attacks on smartphones},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {71--76},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0212},
  doi          = {10.1049/IET-IFS.2010.0212},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Kim12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KimK12,
  author       = {Iksu Kim and
                  Myungho Kim},
  title        = {Agent-based honeynet framework for protecting servers in campus networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {202--211},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0154},
  doi          = {10.1049/IET-IFS.2011.0154},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KimK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiG12,
  author       = {Zhijun Li and
                  Guang Gong},
  title        = {HB\({}^{\mbox{C}}\) entity authentication for low-cost pervasive devices},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {212--218},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0052},
  doi          = {10.1049/IET-IFS.2011.0052},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiuKWC12,
  author       = {Xiaobei Liu and
                  Soo Ngee Koh and
                  Xin{-}Wen Wu and
                  Chee{-}Cheon Chui},
  title        = {Primitive polynomials for robust linear feedback shift registers-based
                  scramblers and stream ciphers},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {183--189},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0215},
  doi          = {10.1049/IET-IFS.2011.0215},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiuKWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LuWFK12,
  author       = {Jiqiang Lu and
                  Yongzhuang Wei and
                  Pierre{-}Alain Fouque and
                  Jongsung Kim},
  title        = {Cryptanalysis of reduced versions of the Camellia block cipher},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {228--238},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0342},
  doi          = {10.1049/IET-IFS.2011.0342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LuWFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MarchangD12,
  author       = {Ningrinla Marchang and
                  Raja Datta},
  title        = {Light-weight trust-based routing protocol for mobile ad hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {77--83},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0160},
  doi          = {10.1049/IET-IFS.2010.0160},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MarchangD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MihaljevicGPI12,
  author       = {Miodrag J. Mihaljevic and
                  Sugata Gangopadhyay and
                  Goutam Paul and
                  Hideki Imai},
  title        = {Internal state recovery of grain-v1 employing normality order of the
                  filter function},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {55--64},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0107},
  doi          = {10.1049/IET-IFS.2011.0107},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MihaljevicGPI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng12,
  author       = {Kun Peng},
  title        = {Attack against a batch zero-knowledge proof system},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--5},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0290},
  doi          = {10.1049/IET-IFS.2011.0290},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng12a,
  author       = {Kun Peng},
  title        = {Critical survey of existing publicly verifiable secret sharing schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {249--257},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0201},
  doi          = {10.1049/IET-IFS.2011.0201},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SunH012,
  author       = {Changhua Sun and
                  Chengchen Hu and
                  Bin Liu},
  title        = {SACK\({}^{\mbox{2}}\): effective {SYN} flood detection against skillful
                  spoofs},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {149--156},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0158},
  doi          = {10.1049/IET-IFS.2010.0158},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SunH012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Tian12,
  author       = {Haibo Tian},
  title        = {Deniable message transmission authenticator based on weak signature
                  schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {258--263},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0139},
  doi          = {10.1049/IET-IFS.2011.0139},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Tian12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VenkataramanPR12,
  author       = {Revathi Venkataraman and
                  Mullur Pushpalatha and
                  T. Rama Rao},
  title        = {Regression-based trust model for mobile ad hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {131--140},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0234},
  doi          = {10.1049/IET-IFS.2011.0234},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VenkataramanPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangCCL12,
  author       = {Jenq{-}Haur Wang and
                  Hung Wei Chang and
                  Che Wun Chiou and
                  Wen{-}Yew Liang},
  title        = {Low-complexity design of bit-parallel dual-basis multiplier over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {324--328},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0210},
  doi          = {10.1049/IET-IFS.2012.0210},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangCCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangJK12,
  author       = {Qichun Wang and
                  Thomas Johansson and
                  Haibin Kan},
  title        = {Some results on fast algebraic attacks and higher-order non-linearities},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {41--46},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0090},
  doi          = {10.1049/IET-IFS.2011.0090},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangQ12,
  author       = {Huaqun Wang and
                  Bo Qin},
  title        = {Improved one-to-many authentication scheme for access control in pay-TV
                  systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {281--290},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0281},
  doi          = {10.1049/IET-IFS.2011.0281},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangZXQ12,
  author       = {Huaqun Wang and
                  Yi{-}Chun Zhang and
                  Hu Xiong and
                  Bo Qin},
  title        = {Cryptanalysis and improvements of an anonymous multi-receiver identity-based
                  encryption scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {20--27},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0252},
  doi          = {10.1049/IET-IFS.2010.0252},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangZXQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WuS12,
  author       = {Xiaotian Wu and
                  Wei Sun},
  title        = {Visual secret sharing for general access structures by random grids},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {299--309},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0046},
  doi          = {10.1049/IET-IFS.2012.0046},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WuS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Xie12,
  author       = {Qi Xie},
  title        = {Provably secure convertible multi-authenticated encryption scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {65--70},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0162},
  doi          = {10.1049/IET-IFS.2011.0162},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Xie12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YangGLJM12,
  author       = {Y. Yang and
                  J. Gu and
                  C. Lv and
                  Qi Jiang and
                  W. Ma},
  title        = {Security analysis of Kulseng et al.'s mutual authentication protocol
                  for {RFID} systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {239--248},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0230},
  doi          = {10.1049/IET-IFS.2010.0230},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YangGLJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YuMWXY12,
  author       = {Yong Yu and
                  Yi Mu and
                  Guilin Wang and
                  Qi Xia and
                  Bo Yang},
  title        = {Improved certificateless signature scheme provably secure in the standard
                  model},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {102--110},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0004},
  doi          = {10.1049/IET-IFS.2011.0004},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YuMWXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhengMCT12,
  author       = {Gang Zheng and
                  Hengtai Ma and
                  C. Cheng and
                  Y.{-}C. Tu},
  title        = {Design and logical analysis on the access authentication scheme for
                  satellite mobile communication networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {6--13},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0233},
  doi          = {10.1049/IET-IFS.2010.0233},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhengMCT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}