-
261
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
262
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
263
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
264
-
265
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
266
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
267
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
268
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
269
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
270
Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
271
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
272
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
273
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
274
Securing cyber-physical robotic systems for enhanced data security and real-time threat mitigation
Published 2025-01-01“…EURASIP Journal on Information Security…”
Get full text
Article -
275
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01“…EURASIP Journal on Information Security…”
Get full text
Article -
276
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01“…The development of big data and its related technology supports and promotes a new round of technological innovation, making a new generation of information security technology reform and innovation, bringing opportunities and challenges to optimize, and consolidating national information security. …”
Get full text
Article -
277
An End-to-End Rumor Detection Model Based on Feature Aggregation
Published 2021-01-01Get full text
Article -
278
-
279
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah
Published 2024-12-01“…Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. …”
Get full text
Article -
280
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
Published 2014-07-01“…With the development of the internet and peripheral network products, information security draw more and more attention, after the outbreak of the prism, the national information security is not only caused the attention of world leaders, has attracted wide attention from people around the world. …”
Get full text
Article