Volume 8; Issue 1

IET Information Security

Volume 8; Issue 1
2

Genetically derived secure cluster-based data aggregation in wireless sensor networks

Year:
2014
Language:
english
File:
PDF, 319 KB
english, 2014
4

A bottom-up approach to verifiable embedded system information flow security

Year:
2014
Language:
english
File:
PDF, 259 KB
english, 2014
6

Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ≤ ⌊((k − 2)/2)⌋

Year:
2014
Language:
english
File:
PDF, 136 KB
english, 2014