default search action
IET Information Security, Volume 6
Volume 6, Number 1, 2012
- Kun Peng:
Attack against a batch zero-knowledge proof system. 1-5 - Gang Zheng, Hengtai Ma, C. Cheng, Y.-C. Tu:
Design and logical analysis on the access authentication scheme for satellite mobile communication networks. 6-13 - Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam:
Obtaining more Karatsuba-like formulae over the binary field. 14-19 - Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin:
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. 20-27 - Kahraman D. Akdemir, Deniz Karakoyunlu, Berk Sunar:
Non-linear error detection for elliptic curve cryptosystems. 28-40 - Qichun Wang, Thomas Johansson, Haibin Kan:
Some results on fast algebraic attacks and higher-order non-linearities. 41-46
Volume 6, Number 2, 2012
- Ai-Jun Ge, Chuangui Ma Ma, Zhenfeng Zhang:
Attribute-based signature scheme with constant size signature in the standard model. 47-54 - Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. 55-64 - Qi Xie:
Provably secure convertible multi-authenticated encryption scheme. 65-70 - Iksu Kim:
Keypad against brute force attacks on smartphones. 71-76 - Ningrinla Marchang, Raja Datta:
Light-weight trust-based routing protocol for mobile ad hoc networks. 77-83 - Yao-Hsin Chou, Chi-Yuan Chen, Rui-Kai Fan, Han-Chieh Chao, Fang-Jhu Lin:
Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping. 84-92 - Jasone Astorga, Eduardo Jacob, Maider Huarte, Marivi Higuero:
Ladon1: end-to-end authorisation support for resource-deprived environments. 93-101 - Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. 102-110 - An Feng, Michael Knieser, Maher E. Rizkalla, Brian King, Paul Salama, Francis Bowen:
Embedded system for sensor communication and security. 111-121
Volume 6, Number 3, 2012
- Chin-Ling Chen, Jyun-Jie Liao:
Fair offline digital content transaction system. 123-130 - Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao:
Regression-based trust model for mobile ad hoc networks. 131-140 - Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar:
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls. 141-148 - Changhua Sun, Chengchen Hu, Bin Liu:
SACK2: effective SYN flood detection against skillful spoofs. 149-156 - Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin, Chiou-Yng Lee:
Fault-tolerant Gaussian normal basis multiplier over GF(2m). 157-170 - Qutaiba Ibrahim Ali, S. Iazim:
Design and implementation of an embedded intrusion detection system for wireless applications. 171-182 - Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers. 183-189 - Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref:
Simultaneously generating multiple keys in a four-terminal network. 190-201 - Iksu Kim, Myungho Kim:
Agent-based honeynet framework for protecting servers in campus networks. 202-211 - Zhijun Li, Guang Gong:
HBC entity authentication for low-cost pervasive devices. 212-218 - Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas:
Long-term preservation of digital signatures for multiple groups of related documents. 219-227 - Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim:
Cryptanalysis of reduced versions of the Camellia block cipher. 228-238
Volume 6, Number 4, 2012
- Y. Yang, J. Gu, C. Lv, Qi Jiang, W. Ma:
Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems. 239-248 - Kun Peng:
Critical survey of existing publicly verifiable secret sharing schemes. 249-257 - Haibo Tian:
Deniable message transmission authenticator based on weak signature schemes. 258-263 - P. Bhattacharya, S. K. Ghosh:
Analytical framework for measuring network security using exploit dependency graph. 264-270 - Mahdi R. Alaghband, Mohammad Reza Aref:
Dynamic and secure key management model for hierarchical heterogeneous sensor networks. 271-280 - Huaqun Wang, Bo Qin:
Improved one-to-many authentication scheme for access control in pay-TV systems. 281-290 - Yung-Wei Kao, Xin Zhang, Ahren Studer, Adrian Perrig:
Mobile encryption for laptop data protection (MELP). 291-298 - Xiaotian Wu, Wei Sun:
Visual secret sharing for general access structures by random grids. 299-309 - Che Wun Chiou, Hung Wei Chang, Wen-Yew Liang, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh:
Low-complexity Gaussian normal basis multiplier over GF(2m). 310-317 - Che Wun Chiou, Tai-Pao Chuang, Shun-Shii Lin, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh:
Palindromic-like representation for Gaussian normal basis multiplier over GF(2m) with odd type t. 318-323 - Jenq-Haur Wang, Hung Wei Chang, Che Wun Chiou, Wen-Yew Liang:
Low-complexity design of bit-parallel dual-basis multiplier over GF(2m). 324-328 - Martin Ågren, Martin Hell, Thomas Johansson:
On hardware-oriented message authentication. 329-336
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.