skip to main content
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters
Mostrar Somente
Refinado por: Nome da Publicação: Iet Information Security remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A bottom-up approach to verifiable embedded system information flow security
Material Type:
Artigo
Adicionar ao Meu Espaço

A bottom-up approach to verifiable embedded system information flow security

Mu, Dejun ; Hu, Wei ; Mao, Baolei ; Ma, Bo

IET information security, 2014-01, Vol.8 (1), p.12-17 [Periódico revisado por pares]

Stevenage: The Institution of Engineering and Technology

Texto completo disponível

2
Parallel-CNN network for malware detection
Material Type:
Artigo
Adicionar ao Meu Espaço

Parallel-CNN network for malware detection

Bakhshinejad, Nazanin ; Hamzeh, Ali

IET information security, 2020-03, Vol.14 (2), p.210-219 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

3
MNOS: a mimic network operating system for software defined networks
Material Type:
Artigo
Adicionar ao Meu Espaço

MNOS: a mimic network operating system for software defined networks

Hu, Hongchao ; Wang, Zhenpeng ; Cheng, Guozhen ; Wu, Jiangxing

IET information security, 2017-11, Vol.11 (6), p.345-355 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

4
Fast Montgomery modular multiplier for Rivest–Shamir–Adleman cryptosystem
Material Type:
Artigo
Adicionar ao Meu Espaço

Fast Montgomery modular multiplier for Rivest–Shamir–Adleman cryptosystem

Parihar, Aashish ; Nakhate, Sangeeta

IET information security, 2019-05, Vol.13 (3), p.231-238 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

5
High-performance and high-speed implementation of polynomial basis Itoh–Tsujii inversion algorithm over GF(2m)
Material Type:
Artigo
Adicionar ao Meu Espaço

High-performance and high-speed implementation of polynomial basis Itoh–Tsujii inversion algorithm over GF(2m)

Rashidi, Bahram ; Rezaeian Farashahi, Reza ; Sayedi, Sayed Masoud

IET information security, 2017-03, Vol.11 (2), p.66-77 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

6
Hardware–software co-design of an iris recognition algorithm
Material Type:
Artigo
Adicionar ao Meu Espaço

Hardware–software co-design of an iris recognition algorithm

López, M. ; Daugman, J. ; Cantó, E.

IET information security, 2011-03, Vol.5 (1), p.60-60 [Periódico revisado por pares]

Stevenage: The Institution of Engineering & Technology

Texto completo disponível

7
Hardware acceleration of regular expression repetitions in deep packet inspection
Material Type:
Artigo
Adicionar ao Meu Espaço

Hardware acceleration of regular expression repetitions in deep packet inspection

Cronin, Brendan ; Wang, Xiaojun

IET information security, 2013-12, Vol.7 (4), p.327-335 [Periódico revisado por pares]

Stevenage: The Institution of Engineering and Technology

Texto completo disponível

8
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability
Material Type:
Artigo
Adicionar ao Meu Espaço

PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability

Raji, Fatemeh ; Davarpanah Jazi, Mohammad ; Miri, Ali

IET information security, 2015-01, Vol.9 (1), p.73-80 [Periódico revisado por pares]

The Institution of Engineering and Technology

Texto completo disponível

9
Recovery of data integrity under multi-tier architectures
Material Type:
Artigo
Adicionar ao Meu Espaço

Recovery of data integrity under multi-tier architectures

Yu, M. ; Zang, W. ; Liu, P.

IET information security, 2010-12, Vol.4 (4), p.344-344 [Periódico revisado por pares]

Stevenage: The Institution of Engineering & Technology

Sem texto completo

10
Trusted P2P computing environments with role-based access control
Material Type:
Artigo
Adicionar ao Meu Espaço

Trusted P2P computing environments with role-based access control

Park, J S ; An, G ; Chandra, D

IET information security, 2007-03, Vol.1 (1), p.27-27 [Periódico revisado por pares]

Stevenage: The Institution of Engineering & Technology

Sem texto completo

Buscando em bases de dados remotas. Favor aguardar.