Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iet-ifs/iet-ifs2.bht:"
@article{DBLP:journals/iet-ifs/AbdallaKN08, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, title = {Generalised key delegation for hierarchical identity-based encryption}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {67--78}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070124}, doi = {10.1049/IET-IFS:20070124}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BahrakA08, author = {Behnam Bahrak and Mohammad Reza Aref}, title = {Impossible differential attack on seven-round {AES-128}}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {28--32}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070078}, doi = {10.1049/IET-IFS:20070078}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BahrakA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BellareS08, author = {Mihir Bellare and Sarah Shoup}, title = {Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {47--63}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070089}, doi = {10.1049/IET-IFS:20070089}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BellareS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Biswas08, author = {Gautam Biswas}, title = {Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {1}, pages = {12--18}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20060142}, doi = {10.1049/IET-IFS:20060142}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Biswas08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BressonM08, author = {Emmanuel Bresson and Mark Manulis}, title = {Contributory group key exchange in the presence of malicious participants}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {85--93}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070113}, doi = {10.1049/IET-IFS:20070113}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BressonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChangLC08, author = {Chin{-}Chen Chang and Chia{-}Chen Lin and Yi{-}Hui Chen}, title = {Reversible data-embedding scheme using differences between original and predicted pixel values}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {35--46}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070004}, doi = {10.1049/IET-IFS:20070004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChangLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FerrignoH08, author = {Julie Ferrigno and Martin Hlav{\'{a}}c}, title = {When {AES} blinks: introducing optical side channel}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {94--98}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20080038}, doi = {10.1049/IET-IFS:20080038}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/FerrignoH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JayalakshmiMD08, author = {M. Jayalakshmi and Shabbir N. Merchant and Uday B. Desai}, title = {Optimum retrieval of watermark from wavelet significant coefficients}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {119--128}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070106}, doi = {10.1049/IET-IFS:20070106}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JayalakshmiMD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/KrzywieckiKN08, author = {Lukasz Krzywiecki and Miroslaw Kutylowski and Maciej Nikodem}, title = {General anonymous key broadcasting via Lagrangian interpolation}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {79--84}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070122}, doi = {10.1049/IET-IFS:20070122}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/KrzywieckiKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiuWL08, author = {Feng Liu and Chuan Kun Wu and Xi Jun Lin}, title = {Colour visual cryptography schemes}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {151--165}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20080066}, doi = {10.1049/IET-IFS:20080066}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiuWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MalikAK08, author = {Hafiz Malik and Rashid Ansari and Ashfaq A. Khokhar}, title = {Robust audio watermarking using frequency-selective spread spectrum}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {129--150}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070145}, doi = {10.1049/IET-IFS:20070145}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MalikAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/NarayanP08, author = {Shivaramakrishnan Narayan and Udaya Parampalli}, title = {Efficient identity-based signatures in the standard model}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {108--118}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070135}, doi = {10.1049/IET-IFS:20070135}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/NarayanP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/PiretS08, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {1}, pages = {1--11}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070066}, doi = {10.1049/IET-IFS:20070066}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/PiretS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SmartOP08, author = {Nigel P. Smart and Elisabeth Oswald and Daniel Page}, title = {Randomised representations}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {2}, pages = {19--27}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070017}, doi = {10.1049/IET-IFS:20070017}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SmartOP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/TartaryZLWP08, author = {Christophe Tartary and Sujing Zhou and Dongdai Lin and Huaxiong Wang and Josef Pieprzyk}, title = {Analysis of bilinear pairing-based accumulator for identity escrowing}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {4}, pages = {99--107}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070091}, doi = {10.1049/IET-IFS:20070091}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/TartaryZLWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.