-
181
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
182
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
183
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
184
Deterioration of Li-doped phenanthroline-based charge generation layer for tandem organic light-emitting diodes
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
185
LoRaWAN-based smart water management IoT applications: a review
Published 2025-02-01“…Journal of Information and Telecommunication…”
Get full text
Article -
186
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
187
The Automation of Document Indexing in Senegalese University Libraries through Artificial Intelligence: Analysis of Practices and Stakeholder Perceptions
Published 2025-01-01“…Journal of Information Sciences…”
Get full text
Article -
188
Microscopic parametrizations for gate set tomography under coloured noise
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
189
Characterization of a thermally stable red-light-emitting phosphor: synthesis, photoluminescence, and thermoluminescence studies of CsCaF3 compound doped with Eu3+ for solid-state...
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
190
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
191
Study of polymer-stabilized cholesteric liquid crystals for reflective displays in active matrix driving
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
192
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
193
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
194
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
195
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
196
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
197
Ontology-driven use of ChatGPT to build guidelines and select technology parameters for IoT lab development
Published 2025-02-01“…Journal of Information and Telecommunication…”
Get full text
Article -
198
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
199
Decoding general error correcting codes and the role of complementarity
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
200
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article