Search dblp for Publications

export results for "toc:db/journals/iet-ifs/iet-ifs2.bht:"

 download as .bib file

@article{DBLP:journals/iet-ifs/AbdallaKN08,
  author       = {Michel Abdalla and
                  Eike Kiltz and
                  Gregory Neven},
  title        = {Generalised key delegation for hierarchical identity-based encryption},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {67--78},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070124},
  doi          = {10.1049/IET-IFS:20070124},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BahrakA08,
  author       = {Behnam Bahrak and
                  Mohammad Reza Aref},
  title        = {Impossible differential attack on seven-round {AES-128}},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {28--32},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070078},
  doi          = {10.1049/IET-IFS:20070078},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BahrakA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BellareS08,
  author       = {Mihir Bellare and
                  Sarah Shoup},
  title        = {Two-tier signatures from the Fiat-Shamir transform, with applications
                  to strongly unforgeable and one-time signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {47--63},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070089},
  doi          = {10.1049/IET-IFS:20070089},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BellareS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Biswas08,
  author       = {Gautam Biswas},
  title        = {Diffie-Hellman technique: extended to multiple two-party keys and
                  one multi-party key},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {12--18},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20060142},
  doi          = {10.1049/IET-IFS:20060142},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Biswas08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BressonM08,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  title        = {Contributory group key exchange in the presence of malicious participants},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {85--93},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070113},
  doi          = {10.1049/IET-IFS:20070113},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BressonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChangLC08,
  author       = {Chin{-}Chen Chang and
                  Chia{-}Chen Lin and
                  Yi{-}Hui Chen},
  title        = {Reversible data-embedding scheme using differences between original
                  and predicted pixel values},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {35--46},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070004},
  doi          = {10.1049/IET-IFS:20070004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ChangLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FerrignoH08,
  author       = {Julie Ferrigno and
                  Martin Hlav{\'{a}}c},
  title        = {When {AES} blinks: introducing optical side channel},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {94--98},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20080038},
  doi          = {10.1049/IET-IFS:20080038},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FerrignoH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JayalakshmiMD08,
  author       = {M. Jayalakshmi and
                  Shabbir N. Merchant and
                  Uday B. Desai},
  title        = {Optimum retrieval of watermark from wavelet significant coefficients},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {119--128},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070106},
  doi          = {10.1049/IET-IFS:20070106},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JayalakshmiMD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KrzywieckiKN08,
  author       = {Lukasz Krzywiecki and
                  Miroslaw Kutylowski and
                  Maciej Nikodem},
  title        = {General anonymous key broadcasting via Lagrangian interpolation},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {79--84},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070122},
  doi          = {10.1049/IET-IFS:20070122},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KrzywieckiKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiuWL08,
  author       = {Feng Liu and
                  Chuan Kun Wu and
                  Xi Jun Lin},
  title        = {Colour visual cryptography schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {151--165},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20080066},
  doi          = {10.1049/IET-IFS:20080066},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiuWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MalikAK08,
  author       = {Hafiz Malik and
                  Rashid Ansari and
                  Ashfaq A. Khokhar},
  title        = {Robust audio watermarking using frequency-selective spread spectrum},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {129--150},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070145},
  doi          = {10.1049/IET-IFS:20070145},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MalikAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/NarayanP08,
  author       = {Shivaramakrishnan Narayan and
                  Udaya Parampalli},
  title        = {Efficient identity-based signatures in the standard model},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {108--118},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070135},
  doi          = {10.1049/IET-IFS:20070135},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/NarayanP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/PiretS08,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Security analysis of higher-order Boolean masking schemes for block
                  ciphers (with conditions of perfect masking)},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {1--11},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070066},
  doi          = {10.1049/IET-IFS:20070066},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/PiretS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SmartOP08,
  author       = {Nigel P. Smart and
                  Elisabeth Oswald and
                  Daniel Page},
  title        = {Randomised representations},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {2},
  pages        = {19--27},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070017},
  doi          = {10.1049/IET-IFS:20070017},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/TartaryZLWP08,
  author       = {Christophe Tartary and
                  Sujing Zhou and
                  Dongdai Lin and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Analysis of bilinear pairing-based accumulator for identity escrowing},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {99--107},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070091},
  doi          = {10.1049/IET-IFS:20070091},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics