知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
期刊
ISSN
1751-8709
刊名
IET Information Security
参考译名
IET信息安全
收藏年代
2007~2013
关联期刊
参考译名
收藏年代
IEE Proceedings
英国电气工程师学会志:信息安全
2006~2007
全部
2007
2008
2009
2010
2011
2012
2013
2009, vol.3, no.1
2009, vol.3, no.2
2009, vol.3, no.3
2009, vol.3, no.4
题名
作者
出版年
年卷期
Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures
S. F. Shahandashti; R. Safavi-Naini
2009
2009, vol.3, no.4
Partial decryption attacks in security-mediated certificateless encryption
S. S. M. Chow; W. S. Yap
2009
2009, vol.3, no.4
Non-iterative privacy preservation for online lotteries
J. S. Lee; C. S. Chan; C. C. Chang
2009
2009, vol.3, no.4
Cryptanalysis of an Iterated Halving-based hash function: CRUSH
N. Bagheri; M. Henricksen; L. R. Knudsen; M. Naderi; B. Sadeghyian
2009
2009, vol.3, no.4
Hidden identity-based signatures
A. Kiayias; H. S. Zhou
2009
2009, vol.3, no.3
Efficient method for simplifying and approximating the S-boxes based on power functions
A. Farhadian; M. R. Aref
2009
2009, vol.3, no.3
Using Alloy to analyse a spatio-temporal access control model supporting delegation
M. Toahchoodee; I. Ray
2009
2009, vol.3, no.3
Heuristic guess-and-determine attacks on stream ciphers
H. Ahmadi; T. Eghlidos
2009
2009, vol.3, no.2
Alternative to the Karatsuba algorithm for software implementations of GF(2~n) multiplications
H. Fan; M. A. Hasan
2009
2009, vol.3, no.2
Signature scheme based on the root extraction problem over braid groups
B. C. Wang; Y. P. Hu
2009
2009, vol.3, no.2
1
2
制造业外文文献服务平台