Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1741
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
1742
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1743
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
1744
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1745
Eggshell waste as a promising adsorbent for phosphorus recovery from wastewater: A review
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1746
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1747
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
1748
Black carp RNF115 restricts IRF3/7-mediated antiviral signaling in innate immunity
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1749
Taxonomic and functional diversity of protists in saline and hypersaline lakes in southern Western Siberia, a region strongly affected by climate change
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1750
ЧЕЛОВЕК РАЗУМНЫЙ И ЧЕЛОВЕК ИСКУССТВЕННЫЙ: СОЦИАЛЬНАЯ БЕЗОПАСНОСТЬ ИЛИ ИЛЛЮЗИЯ БЕЗОПАСНОСТИ
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1751
Microbial diversity and biogeography across gastrointestinal tracts of Takifugu pufferfish revealed by full-length 16S amplicon sequencing
Published 2025-01-01“…Water Biology and Security…”
Get full text
Article -
1752
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
1753
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
1754
ГРУППЫ РИСКА РАЗВИТИЯ ТРЕВОГИ И ДЕПРЕССИИ СРЕДИ РОССИЯН СТАРШЕ 60 ЛЕТ (РЕЗУЛЬТАТЫ СОЦИОЛОГИЧЕСКОГО ИССЛЕДОВАНИЯ)...
Published 2025-02-01“…Society and Security Insights…”
Get full text
Article -
1755
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
1756
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
1757
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
1758
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
1759
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
1760
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article