Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 12 results:
RTF
EndNote XML
Filters:
Keyword
is
cryptography
[Clear All Filters]
2022
Shalamanov, Velizar
,
Ivan Blagoev
, and
Iliyan Iliev
.
Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg
In
IT4Sec Reports
., 2022.
DOI
Google Scholar
RTF
EndNote XML
2021
Brandmeier, Rupert A.
,
Jörn-Alexander Heye
, and
Clemens Woywod
.
"
Future Development of Quantum Computing and Its Relevance to NATO
."
Connections: The Quarterly Journal
20, no. 2 (2021): 89-109.
DOI
Google Scholar
RTF
EndNote XML
Blagoev, Ivan
,
Todor Balabanov
, and
Iliyan Iliev
.
"
RSA Weaknesses Caused by the Specifics of Random Number Generation
."
Information & Security: An International Journal
50, no. 2 (2021): 171-179 .
DOI
Google Scholar
RTF
EndNote XML
2020
Blagoev, Ivan
.
"
Neglected Cybersecurity Risks in the Public Internet Hosting Service Providers
."
Information & Security: An International Journal
47, no. 1 (2020): 62-76.
DOI
Google Scholar
RTF
EndNote XML
2017
Sharkov, George
, and
Christina Todorova
.
"
Capture the Flag for Cyber-Resilience Exercising through Cryptographic Puzzles and Collaborative Problem-Solving
."
Information & Security: An International Journal
37 (2017): 95-102.
DOI
Google Scholar
RTF
EndNote XML
Shikfa, Abdullatif
.
"
Garbled Circuits: Optimizations and Implementations
."
Information & Security: An International Journal
37 (2017): 11-27.
DOI
Google Scholar
RTF
EndNote XML
2013
Sharma, Ajay
, and
Deo Brat Ojha
.
"
Biometric Template Security Using Code Base Cryptosystem
."
Information & Security: An International Journal
26, no. 2 (2013): 47-57.
DOI
Google Scholar
RTF
EndNote XML
2011
Goel, Ajay
,
O.P.Sahu
,
Aman Soni
, and
Punit Soni
.
"
A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images
."
Information & Security: An International Journal
26, no. 1 (2011): 27-33.
Google Scholar
RTF
EndNote XML
2004
Chang, Ting-Yi
,
Min-Shiang Hwang
, and
Wei-Pang Yang
.
"
Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function
."
Information & Security: An International Journal
15, no. 1 (2004): 110-114.
DOI
Google Scholar
RTF
EndNote XML
Surendro, Kridanto
, and
Setiyo Cahyono
.
"
Secure e-Mail Application Software for Government in Indonesia
."
Information & Security: An International Journal
15, no. 2 (2004): 135-150.
DOI
Google Scholar
RTF
EndNote XML
2000
Tselkov, Veselin
.
"
Cryptographic Software Solution for Information Protection in a Corporate Intranet
."
Information & Security: An International Journal
4 (2000): 97-104.
DOI
Google Scholar
RTF
EndNote XML
Tselkov, Veselin
, and
Dragomir Pargov
.
"
Information Assurance in C4I Systems
."
Information & Security: An International Journal
4 (2000): 43-59.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance