Search dblp for Publications

export results for "toc:db/journals/iet-ifs/iet-ifs4.bht:"

 download as .bib file

@article{DBLP:journals/iet-ifs/AminiJ10,
  author       = {Morteza Amini and
                  Rasool Jalili},
  title        = {Multi-level authorisation model and framework for distributed semantic-aware
                  environments},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {301--321},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0198},
  doi          = {10.1049/IET-IFS.2009.0198},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AminiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BaigS10,
  author       = {Zubair A. Baig and
                  Khaled Salah},
  title        = {Multi-Agent pattern recognition mechanism for detecting distributed
                  denial of service attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {333--343},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0255},
  doi          = {10.1049/IET-IFS.2009.0255},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BaigS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BeraGD10,
  author       = {Padmalochan Bera and
                  Santosh K. Ghosh and
                  Pallab Dasgupta},
  title        = {Integrated security analysis framework for an enterprise network -
                  a formal approach},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {283--300},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0174},
  doi          = {10.1049/IET-IFS.2009.0174},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BeraGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BishopORL10,
  author       = {Stephen Bishop and
                  Hamed Okhravi and
                  Shahram Rahimi and
                  Yung{-}Chuan Lee},
  title        = {Covert channel resistant information leakage protection using a multi-agent
                  architecture},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {233--247},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0202},
  doi          = {10.1049/IET-IFS.2009.0202},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BishopORL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Bravo-SolorioGNA10,
  author       = {Sergio Bravo{-}Solorio and
                  Lu Gan and
                  Asoke K. Nandi and
                  Maurice F. Aburdene},
  title        = {Secure private fragile watermarking scheme with improved tampering
                  localisation accuracy},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {137--148},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0141},
  doi          = {10.1049/IET-IFS.2009.0141},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Bravo-SolorioGNA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BulensSQ10,
  author       = {Philippe Bulens and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {How to strongly link data and its medium: the paper case},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {125--136},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0032},
  doi          = {10.1049/IET-IFS.2009.0032},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BulensSQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/CaleroPG10,
  author       = {Jose M. Alcaraz Calero and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {Towards an authorisation model for distributed systems based on the
                  Semantic Web},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {411--421},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0260},
  doi          = {10.1049/IET-IFS.2009.0260},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/CaleroPG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Chandrasekhar0SC10,
  author       = {Santosh Chandrasekhar and
                  Saikat Chakrabarti and
                  Mukesh Singhal and
                  Kenneth L. Calvert},
  title        = {Efficient proxy signatures based on trapdoor hash functions},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {322--332},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0204},
  doi          = {10.1049/IET-IFS.2009.0204},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Chandrasekhar0SC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DaemenR10,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Refinements of the {ALRED} construction and {MAC} security claims},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {149--157},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0015},
  doi          = {10.1049/IET-IFS.2010.0015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FanSGL10,
  author       = {Haining Fan and
                  Jia{-}Guang Sun and
                  Ming Gu and
                  Kwok{-}Yan Lam},
  title        = {Overlap-free Karatsuba-Ofman polynomial multiplication algorithms},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {8--14},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0039},
  doi          = {10.1049/IET-IFS.2009.0039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FanSGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FatemiSS10,
  author       = {Mitra Fatemi and
                  Somayeh Salimi and
                  Ahmad Salahi},
  title        = {Anonymous roaming in universal mobile telecommunication system mobile
                  networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {93--103},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0154},
  doi          = {10.1049/IET-IFS.2009.0154},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FatemiSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GuoLDC10,
  author       = {Ming{-}Huang Guo and
                  Horng{-}Twu Liaw and
                  Der{-}Jiunn Deng and
                  Han{-}Chieh Chao},
  title        = {Cluster-based secure communication mechanism in wireless ad hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {352--360},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0120},
  doi          = {10.1049/IET-IFS.2009.0120},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GuoLDC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HaoRZ10,
  author       = {Feng Hao and
                  Peter Y. A. Ryan and
                  Piotr Zielinski},
  title        = {Anonymous voting by two-round public discussion},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {62--67},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0127},
  doi          = {10.1049/IET-IFS.2008.0127},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HaoRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuangCCC10,
  author       = {Wen{-}Tzeng Huang and
                  Chih{-}Hsiang Chang and
                  Che Wun Chiou and
                  Fu{-}Hua Chou},
  title        = {Concurrent error detection and correction in a polynomial basis multiplier
                  over GF(2\({}^{\mbox{m}}\))},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {111--124},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0160},
  doi          = {10.1049/IET-IFS.2009.0160},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuangCCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Jensen10,
  author       = {Christian Damsgaard Jensen},
  title        = {Supporting multi-agent reputation calculation in the Wikipedia Recommender
                  System},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {273--282},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0001},
  doi          = {10.1049/IET-IFS.2010.0001},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Jensen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/KarakoyunluGSL10,
  author       = {Deniz Karakoyunlu and
                  Frank Kagan G{\"{u}}rkaynak and
                  Berk Sunar and
                  Yusuf Leblebici},
  title        = {Efficient and side-channel-aware implementations of elliptic curve
                  cryptosystems over prime fields},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {30--43},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0038},
  doi          = {10.1049/IET-IFS.2009.0038},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/KarakoyunluGSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiJZZW10,
  author       = {Xin Li and
                  Zhiping Jia and
                  Peng Zhang and
                  Ruihua Zhang and
                  Haiyang Wang},
  title        = {Trust-based on-demand multipath routing in mobile ad hoc networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {212--232},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0140},
  doi          = {10.1049/IET-IFS.2009.0140},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiJZZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiuV10,
  author       = {Jing Liu and
                  Laurent Vigneron},
  title        = {Design and verification of a non-repudiation protocol based on receiver-side
                  smart card},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {15--29},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0086},
  doi          = {10.1049/IET-IFS.2009.0086},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiuV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MisraKA10,
  author       = {Sudip Misra and
                  P. Venkata Krishna and
                  Kiran Isaac Abraham},
  title        = {Adaptive link-state routing and intrusion detection in wireless mesh
                  networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {374--389},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0196},
  doi          = {10.1049/IET-IFS.2009.0196},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MisraKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/NojoumianSG10,
  author       = {Mehrdad Nojoumian and
                  Douglas R. Stinson and
                  Morgan Grainger},
  title        = {Unconditionally secure social secret sharing scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {202--211},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0098},
  doi          = {10.1049/IET-IFS.2009.0098},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/NojoumianSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RajiL10,
  author       = {Fatemeh Raji and
                  Behrouz Tork Ladani},
  title        = {Anonymity and security for autonomous mobile agents},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {397--410},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0217},
  doi          = {10.1049/IET-IFS.2009.0217},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/RajiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RashvandSCH10,
  author       = {Habib F. Rashvand and
                  Khaled Salah and
                  Jose M. Alcaraz Calero and
                  Lein Harn},
  title        = {Distributed security for multi-agent systems - review and applications},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {188--201},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0041},
  doi          = {10.1049/IET-IFS.2010.0041},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/RashvandSCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SakarindrA10,
  author       = {Pitipatana Sakarindr and
                  Nirwan Ansari},
  title        = {Survey of security services on group communications},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {258--272},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0261},
  doi          = {10.1049/IET-IFS.2009.0261},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SakarindrA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SekhavatF10,
  author       = {Yoones Asgharzadeh Sekhavat and
                  Mohammad Fathian},
  title        = {Mining frequent itemsets in the presence of malicious participants},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {80--92},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0128},
  doi          = {10.1049/IET-IFS.2009.0128},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SekhavatF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Shirali-ShahrezaS10,
  author       = {Mohammad Hassan Shirali{-}Shahreza and
                  Sajad Shirali{-}Shahreza},
  title        = {Real-time and {MPEG-1} layer {III} compression resistant steganography
                  in speech},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--7},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0129},
  doi          = {10.1049/IET-IFS.2008.0129},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Shirali-ShahrezaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VelichkovRP10,
  author       = {Vesselin Velichkov and
                  Vincent Rijmen and
                  Bart Preneel},
  title        = {Algebraic cryptanalysis of a small-scale version of stream cipher
                  Lex},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {49--61},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0118},
  doi          = {10.1049/IET-IFS.2009.0118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Wang10,
  author       = {Bin Wang},
  title        = {On the security of an identity-based proxy multi-signature scheme},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {45--48},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0033},
  doi          = {10.1049/IET-IFS.2009.0033},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Wang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangC10,
  author       = {Wenqiang Wang and
                  Shaozhen Chen},
  title        = {Attribute-based ring signature scheme with constant-size signature},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {104--110},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0189},
  doi          = {10.1049/IET-IFS.2009.0189},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WangW10,
  author       = {Kun Wang and
                  Meng Wu},
  title        = {Cooperative communications based on trust model for mobile ad hoc
                  networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {68--79},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0056},
  doi          = {10.1049/IET-IFS.2009.0056},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WenHCG10,
  author       = {Hong Wen and
                  Pin{-}Han Ho and
                  Qi Chai and
                  Guang Gong},
  title        = {Physical layer assisted authentication for distributed ad hoc wireless
                  sensor networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {390--396},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0197},
  doi          = {10.1049/IET-IFS.2009.0197},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WenHCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YargicogluI10,
  author       = {A. Utku Yargi{\c{c}}oglu and
                  Hakki G{\"{o}}khan Ilk},
  title        = {Hidden data transmission in mixed excitation linear prediction coded
                  speech using quantisation index modulation},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {158--166},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0092},
  doi          = {10.1049/IET-IFS.2009.0092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YargicogluI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YenWGYC10,
  author       = {Chih{-}Ta Yen and
                  Tzong{-}Chen Wu and
                  Ming{-}Huang Guo and
                  Chuan{-}Kai Yang and
                  Han{-}Chieh Chao},
  title        = {Digital product transaction mechanism for electronic auction environment},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {248--257},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0250},
  doi          = {10.1049/IET-IFS.2009.0250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YenWGYC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/YuZL10,
  author       = {Meng Yu and
                  Wanyu Zang and
                  Peng Liu},
  title        = {Recovery of data integrity under multi-tier architectures},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {344--351},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0264},
  doi          = {10.1049/IET-IFS.2009.0264},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/YuZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangCCSPP10,
  author       = {Yi{-}Ying Zhang and
                  Han{-}Chieh Chao and
                  Min Chen and
                  Lei Shu and
                  Chulhyun Park and
                  Myong{-}Soon Park},
  title        = {Outlier detection and countermeasure for hierarchical wireless sensor
                  networks},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {361--373},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0192},
  doi          = {10.1049/IET-IFS.2009.0192},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangCCSPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhaoF10,
  author       = {Xianfeng Zhao and
                  Dengguo Feng},
  title        = {Bypassing the decomposition attacks on two-round multivariate schemes
                  by a practical cubic round},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {167--184},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2007.0110},
  doi          = {10.1049/IET-IFS.2007.0110},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhaoF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics