期刊


ISSN1751-8709
刊名IET Information Security
参考译名IET信息安全
收藏年代2007~2013

关联期刊参考译名收藏年代
IEE Proceedings英国电气工程师学会志:信息安全2006~2007


全部

2007 2008 2009 2010 2011 2012
2013

2012, vol.6, no.1 2012, vol.6, no.2 2012, vol.6, no.3 2012, vol.6, no.4

题名作者出版年年卷期
On hardware-oriented message authenticationM. Agren; M. Hell; T. Johansson20122012, vol.6, no.4
Low-complexity design of bit-parallel dual-basis multiplier over GF(2~m)J. H. Wang; H. W. Chang; C. W. Chiou; W. Y. Liang20122012, vol.6, no.4
Palindromic-like representation for Gaussian normal basis multiplier over GF(2~m) with odd type tC. W. Chiou; T. P. Chuang; S. S. Lin; C. Y. Lee; J. M. Lin; Y. C. Yeh20122012, vol.6, no.4
Low-complexity Gaussian normal basis multiplier over GF(2~m)C. W. Chiou; H. W. Chang; W. Y. Liang; C. Y. Lee; J. M. Lin; Y. C. Yeh20122012, vol.6, no.4
Visual secret sharing for general access structures by random gridsX. Wu; W. Sun20122012, vol.6, no.4
Mobile encryption for laptop data protection (MELP)Y. W. Kao; X. Zhang; A. Studer; A. Perrig20122012, vol.6, no.4
Improved one-to-many authentication scheme for access control in pay-TV systemsH. Wang; B. Qin20122012, vol.6, no.4
Dynamic and secure key management model for hierarchical heterogeneous sensor networksM. R. Alagheband; M. R. Aref20122012, vol.6, no.4
Analytical framework for measuring network security using exploit dependency graphP. Bhattacharya; S. K. Ghosh20122012, vol.6, no.4
Deniable message transmission authenticator based on weak signature schemesH. Tian20122012, vol.6, no.4
12345678