skip to main content
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: Base de dados/Biblioteca: DOAJ Directory of Open Access Journals remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS)
Material Type:
Artigo
Adicionar ao Meu Espaço

Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS)

IET information security, 2020-05, Vol.14 (3), p.253-253 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

2
Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016)
Material Type:
Artigo
Adicionar ao Meu Espaço

Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016)

IET information security, 2018-07, Vol.12 (4), p.247-247 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

3
Impact of the modulus switching technique on some attacks against learning problems
Material Type:
Artigo
Adicionar ao Meu Espaço

Impact of the modulus switching technique on some attacks against learning problems

Le, Huy Quoc ; Mishra, Pradeep Kumar ; Nakamura, Satoshi ; Kinjo, Koha ; Duong, Dung Hoang ; Yasuda, Masaya

IET information security, 2020-05, Vol.14 (3), p.286-303 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

4
Faster privacy-preserving location proximity schemes for circles and polygons
Material Type:
Artigo
Adicionar ao Meu Espaço

Faster privacy-preserving location proximity schemes for circles and polygons

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng

IET information security, 2020-05, Vol.14 (3), p.254-265 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

5
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
Material Type:
Artigo
Adicionar ao Meu Espaço

Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project

Liu, Zhen ; Pan, Yanbin ; Xie, Tianyuan

IET information security, 2020-05, Vol.14 (3), p.313-320 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

6
Fully invisible protean signatures schemes
Material Type:
Artigo
Adicionar ao Meu Espaço

Fully invisible protean signatures schemes

Krenn, Stephan ; Pöhls, Henrich C ; Samelin, Kai ; Slamanig, Daniel

IET information security, 2020-05, Vol.14 (3), p.266-285 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

7
Complexity of statistical attacks on QC-LDPC code-based cryptosystems
Material Type:
Artigo
Adicionar ao Meu Espaço

Complexity of statistical attacks on QC-LDPC code-based cryptosystems

Santini, Paolo ; Baldi, Marco ; Chiaraluce, Franco

IET information security, 2020-05, Vol.14 (3), p.304-312 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

8
Power of public-key function-private functional encryption
Material Type:
Artigo
Adicionar ao Meu Espaço

Power of public-key function-private functional encryption

Iovino, Vincenzo ; Tang, Qiang ; Żebrowski, Karol

IET information security, 2018-07, Vol.12 (4), p.248-256 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

9
Sandwich construction for keyed sponges: independence between capacity and construction queries
Material Type:
Artigo
Adicionar ao Meu Espaço

Sandwich construction for keyed sponges: independence between capacity and construction queries

Naito, Yusuke

IET information security, 2018-07, Vol.12 (4), p.265-274 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

10
Analysing HSTS and HPKP implementation in both browsers and servers
Material Type:
Artigo
Adicionar ao Meu Espaço

Analysing HSTS and HPKP implementation in both browsers and servers

De los Santos, Sergio ; Torres, José

IET information security, 2018-07, Vol.12 (4), p.275-284 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Revistas revisadas por pares (2.150)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (2.518)
  2. Anais de Congresso  (9)
  3. Resenhas  (1)
  4. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de2006  (6)
  2. 2006Até2009  (49)
  3. 2010Até2013  (239)
  4. 2014Até2018  (833)
  5. Após 2018  (1.402)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (2.523)
  2. Japonês  (68)
  3. Espanhol  (10)
  4. Português  (9)
  5. Árabe  (4)
  6. Polonês  (2)
  7. Turco  (2)
  8. Russo  (1)
  9. Norueguês  (1)
  10. Chinês  (1)
  11. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.