知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
期刊
ISSN
1751-8709
刊名
IET Information Security
参考译名
IET信息安全
收藏年代
2007~2013
关联期刊
参考译名
收藏年代
IEE Proceedings
英国电气工程师学会志:信息安全
2006~2007
全部
2007
2008
2009
2010
2011
2012
2013
2012, vol.6, no.1
2012, vol.6, no.2
2012, vol.6, no.3
2012, vol.6, no.4
题名
作者
出版年
年卷期
On hardware-oriented message authentication
M. Agren; M. Hell; T. Johansson
2012
2012, vol.6, no.4
Low-complexity design of bit-parallel dual-basis multiplier over GF(2~m)
J. H. Wang; H. W. Chang; C. W. Chiou; W. Y. Liang
2012
2012, vol.6, no.4
Palindromic-like representation for Gaussian normal basis multiplier over GF(2~m) with odd type t
C. W. Chiou; T. P. Chuang; S. S. Lin; C. Y. Lee; J. M. Lin; Y. C. Yeh
2012
2012, vol.6, no.4
Low-complexity Gaussian normal basis multiplier over GF(2~m)
C. W. Chiou; H. W. Chang; W. Y. Liang; C. Y. Lee; J. M. Lin; Y. C. Yeh
2012
2012, vol.6, no.4
Visual secret sharing for general access structures by random grids
X. Wu; W. Sun
2012
2012, vol.6, no.4
Mobile encryption for laptop data protection (MELP)
Y. W. Kao; X. Zhang; A. Studer; A. Perrig
2012
2012, vol.6, no.4
Improved one-to-many authentication scheme for access control in pay-TV systems
H. Wang; B. Qin
2012
2012, vol.6, no.4
Dynamic and secure key management model for hierarchical heterogeneous sensor networks
M. R. Alagheband; M. R. Aref
2012
2012, vol.6, no.4
Analytical framework for measuring network security using exploit dependency graph
P. Bhattacharya; S. K. Ghosh
2012
2012, vol.6, no.4
Deniable message transmission authenticator based on weak signature schemes
H. Tian
2012
2012, vol.6, no.4
1
2
3
4
5
6
7
8
制造业外文文献服务平台