Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
A bottom-up approach to verifiable embedded system information flow securityMu, Dejun ; Hu, Wei ; Mao, Baolei ; Ma, BoIET information security, 2014-01, Vol.8 (1), p.12-17 [Periódico revisado por pares]Stevenage: The Institution of Engineering and TechnologyTexto completo disponível |
|
2 |
Material Type: Artigo
|
Parallel-CNN network for malware detectionBakhshinejad, Nazanin ; Hamzeh, AliIET information security, 2020-03, Vol.14 (2), p.210-219 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
|
3 |
Material Type: Artigo
|
MNOS: a mimic network operating system for software defined networksHu, Hongchao ; Wang, Zhenpeng ; Cheng, Guozhen ; Wu, JiangxingIET information security, 2017-11, Vol.11 (6), p.345-355 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
|
4 |
Material Type: Artigo
|
Fast Montgomery modular multiplier for Rivest–Shamir–Adleman cryptosystemParihar, Aashish ; Nakhate, SangeetaIET information security, 2019-05, Vol.13 (3), p.231-238 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
|
5 |
Material Type: Artigo
|
High-performance and high-speed implementation of polynomial basis Itoh–Tsujii inversion algorithm over GF(2m)Rashidi, Bahram ; Rezaeian Farashahi, Reza ; Sayedi, Sayed MasoudIET information security, 2017-03, Vol.11 (2), p.66-77 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
|
6 |
Material Type: Artigo
|
Hardware–software co-design of an iris recognition algorithmLópez, M. ; Daugman, J. ; Cantó, E.IET information security, 2011-03, Vol.5 (1), p.60-60 [Periódico revisado por pares]Stevenage: The Institution of Engineering & TechnologyTexto completo disponível |
|
7 |
Material Type: Artigo
|
Hardware acceleration of regular expression repetitions in deep packet inspectionCronin, Brendan ; Wang, XiaojunIET information security, 2013-12, Vol.7 (4), p.327-335 [Periódico revisado por pares]Stevenage: The Institution of Engineering and TechnologyTexto completo disponível |
|
8 |
Material Type: Artigo
|
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availabilityRaji, Fatemeh ; Davarpanah Jazi, Mohammad ; Miri, AliIET information security, 2015-01, Vol.9 (1), p.73-80 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
|
9 |
Material Type: Artigo
|
Recovery of data integrity under multi-tier architecturesYu, M. ; Zang, W. ; Liu, P.IET information security, 2010-12, Vol.4 (4), p.344-344 [Periódico revisado por pares]Stevenage: The Institution of Engineering & TechnologySem texto completo |
|
10 |
Material Type: Artigo
|
Trusted P2P computing environments with role-based access controlPark, J S ; An, G ; Chandra, DIET information security, 2007-03, Vol.1 (1), p.27-27 [Periódico revisado por pares]Stevenage: The Institution of Engineering & TechnologySem texto completo |