期刊


ISSN1751-8709
刊名IET Information Security
参考译名IET信息安全
收藏年代2007~2013

关联期刊参考译名收藏年代
IEE Proceedings英国电气工程师学会志:信息安全2006~2007


全部

2007 2008 2009 2010 2011 2012
2013

2009, vol.3, no.1 2009, vol.3, no.2 2009, vol.3, no.3 2009, vol.3, no.4

题名作者出版年年卷期
Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signaturesS. F. Shahandashti; R. Safavi-Naini20092009, vol.3, no.4
Partial decryption attacks in security-mediated certificateless encryptionS. S. M. Chow; W. S. Yap20092009, vol.3, no.4
Non-iterative privacy preservation for online lotteriesJ. S. Lee; C. S. Chan; C. C. Chang20092009, vol.3, no.4
Cryptanalysis of an Iterated Halving-based hash function: CRUSHN. Bagheri; M. Henricksen; L. R. Knudsen; M. Naderi; B. Sadeghyian20092009, vol.3, no.4
Hidden identity-based signaturesA. Kiayias; H. S. Zhou20092009, vol.3, no.3
Efficient method for simplifying and approximating the S-boxes based on power functionsA. Farhadian; M. R. Aref20092009, vol.3, no.3
Using Alloy to analyse a spatio-temporal access control model supporting delegationM. Toahchoodee; I. Ray20092009, vol.3, no.3
Heuristic guess-and-determine attacks on stream ciphersH. Ahmadi; T. Eghlidos20092009, vol.3, no.2
Alternative to the Karatsuba algorithm for software implementations of GF(2~n) multiplicationsH. Fan; M. A. Hasan20092009, vol.3, no.2
Signature scheme based on the root extraction problem over braid groupsB. C. Wang; Y. P. Hu20092009, vol.3, no.2
12