-
81
International Experience of Innovative Development of the Forest Industry in the Post-War Period and Its Adaptation for Ukraine
Published 2024-06-01“…Bìznes Inform…”
Get full text
Article -
82
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
83
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
84
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
85
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
86
Optimization of retarder parameters for switchable privacy mode automotive displays under asymmetric viewing conditions
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
87
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
88
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
89
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
90
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
91
State estimation with quantum extreme learning machines beyond the scrambling time
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
92
Ultra-dispersive resonator readout of a quantum-dot qubit using longitudinal coupling
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
93
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
94
A low-power metal–oxide scan driver circuit outputting non-overlapping pulses with DC power-supplied buffer
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
95
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
96
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…IET Information Security…”
Get full text
Article -
97
Data acquisition system for OLED defect detection and augmentation of system data through diffusion model
Published 2025-01-01“…Journal of Information Display…”
Get full text
Article -
98
Universal validity of the second law of information thermodynamics
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
99
Codes for entanglement-assisted classical communication
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
100
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…IET Information Security…”
Get full text
Article