Application of Bayesian network in risk assessment for website deployment scenarios VTH Giang, NM Tuan Journal of Science and Technology on Information security 2 (14), 3-17, 2021 | 5 | 2021 |
From AES to Dynamic AES P Freyre, O Cuellar, N Díaz, A Alfonso Journal of Science and Technology on Information security 1 (11), 11-22, 2020 | 4 | 2020 |
Constructing Recursive MDS Matrices Effective for Implementation from Reed-Solomon Codes and Preserving the Recursive Property of MDS Matrix of Scalar Multiplication. TT Luong, NN Cuong, HD Tho Journal of Informatics & Mathematical Sciences 11 (2), 2019 | 4 | 2019 |
Some results on new statistical randomness tests based on length of runs HĐ Linh Journal of Science and Technology on Information security 8 (2), 10-18, 2018 | 4 | 2018 |
Statistical assessment of two rekeying mechanisms applied to the generation of random numbers AA Peñate, DA Echevarria, LC Argudín Journal of Science and Technology on Information security 2 (12), 38-44, 2020 | 3 | 2020 |
Block ciphers with matrices operating alternately over columns and rows P Freyre, O Cuellar, N Díaz, A Alfonso Journal of Science and Technology on Information security 2 (12), 18-29, 2020 | 2 | 2020 |
Detecting Web attacks based on clustering algorithm and multi-branch CNN P Van Huong, PS Nguyen Journal of Science and Technology on Information security 2 (12), 31-37, 2020 | 2 | 2020 |
Information leakage through electromagnetic radiation of PS/2 Keyboard CD Bui, HNV Nguyen, TM Pham Journal of Science and Technology on Information security 10 (2), 51-60, 2019 | 2 | 2019 |
Hardware trojan detection technique using frequency characteristic analysis of path delay in application specific integrated circuits HT Tran, P Van Hoang, TN Do, DH Nguyen Journal of Science and Technology on Information security 10 (2), 36-43, 2019 | 2 | 2019 |
EEG Signals For Authentication In Security Systems PT Dũng, ĐH Gia, L Khải, ĐTH Vân Nghiên cúu Khoa học và Công nghệ trong lĩ nh vực An toàn thông tin 2 (03), 17-32, 2016 | 2 | 2016 |
Solution for Cryptographic Intervention in PCI-Express Data Transmission on FPGA Board P Van Ky, VT Cuong Journal of Science and Technology on Information security 2 (12), 59-68, 2020 | 1 | 2020 |
Applicaton of parameters of voice singal autoregressive models to solve speaker recognition problems E Novikov, V Trubitsyn Journal of Science and Technology on Information security 10 (2), 25-35, 2019 | 1 | 2019 |
Decode-and-Forward vs. Amplify-and-Forward Scheme in Physical Layer Security for Wireless Relay Beamforming Networks TN Nguyen Journal of Science and Technology on Information security 10 (2), 9-17, 2019 | 1 | 2019 |
Giải pháp bảo mật đầu cuối cho điện thoại di động TV Khánh, NT Vinh Journal of Science and Technology on Information security 9 (01), 37-48, 2019 | 1 | 2019 |
Phân tích các thành phần mật mã trong hoán vị Keccak-p NV Long Journal of Science and Technology on Information security 8 (2), 34-45, 2018 | 1 | 2018 |
How secure is the Advanced Encryption Standard with random ShiftRows against Fault Analysis AA Peñate, PF Arrozarena Journal of Science and Technology on Information security 7 (1), 14-21, 2018 | 1 | 2018 |
Phương pháp phát nhiễu đồng bộ chống thu bức xạ kênh kề phát ra từ màn hình máy tính dựa trên công nghệ FPGA NNV Hảo, BĐ Chính Journal of Science and Technology on Information security 7 (1), 44-50, 2018 | 1 | 2018 |
Độ an toàn chứng minh được của lược đồ chữ ký FIAT-SHAMIR dựa trên ý tưởng của POINTCHEVAL TQ Phong, VT Linh Journal of Science and Technology on Information Security 1 (1), 2015 | 1 | 2015 |
Thuật toán sinh số nguyên tố tất định hiệu quả trên thiết bị nhúng TD Lai, HV Thức, TS Nam Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin, ISSN …, 2015 | 1 | 2015 |
Truyền dữ liệu qua kênh thoại GSM với CD-FSK LMT La Hữu Phúc Chuyên san Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin …, 0 | 1 | |