


default search action
IET Information Security, Volume 10
Volume 10, Number 1, January 2016
- Clémentine Gritti, Willy Susilo

, Thomas Plantard
:
Logarithmic size ring signatures without random oracles. 1-7 - Weiqiang Wen

, Libin Wang, Jiaxin Pan
:
Unified security model of authenticated key exchange with specific adversarial capabilities. 8-17 - Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:

Random table and hash coding-based binary code obfuscation against stack trace analysis. 18-27 - Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou:

Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. 28-32 - José Luis Salazar, José Luis Tornos, Joan Josep Piles:

Efficient ways of prime number generation for ring signatures. 33-36 - Hao Wu, Xianglei Dang, Lidong Wang, Longtao He:

Information fusion-based method for distributed domain name system cache poisoning attack detection and identification. 37-44 - Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu:

Robustness of text-based completely automated public turing test to tell computers and humans apart. 45-52
Volume 10, Number 2, March 2016
- Yang Tan

, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li:
Building a new secure variant of Rainbow signature scheme. 53-59 - Esther Palomar

, Lorena González-Manzano
, Almudena Alcaide, Álvaro Galán:
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. 60-68 - Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang:

Short and provably secure designated verifier proxy signature scheme. 69-79 - Yang Lu, Jiguo Li:

Improved certificate-based signature scheme without random oracles. 80-86 - Lingfeng Liu, Suoxia Miao, Hanping Hu

, Ya Shuang Deng:
Pseudorandom bit generator based on non-stationary logistic maps. 87-94 - Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:

Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. 95-103 - Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang:

Linear complexity of generalised cyclotomic quaternary sequences of length 2p m+1 q n+1. 104-111
Volume 10, Number 3, May 2016
- Gareth Owen, Nick Savage:

Empirical analysis of Tor Hidden Services. 113-118 - Xiaoming Wang, Yanchun Lin, Yu Fang:

Authenticating multi-dimensional query results in outsourced database. 119-124 - Stavros Papadopoulos, Konstantinos Moustakas, Anastasios Drosou, Dimitrios Tzovaras

:
Border gateway protocol graph: detecting and visualising internet routing anomalies. 125-133 - Quanqiang Zhou

:
Supervised approach for detecting average over popular items attack in collaborative recommender systems. 134-141 - Yonglin Hao:

Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers. 142-151 - Houzhen Wang, Huanguo Zhang, Shaohua Tang:

Key recovery on several matrix public-key encryption schemes. 152-155 - Seyed Amir Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia:

Covert communications through mobile voice channels. 156-164
Volume 10, Number 4, July 2016
- Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref:

Dynamic cube attack on Grain-v1. 165-172 - Bin Wang:

Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system. 173-179 - Sungwook Kim:

Effective certificate revocation scheme based on weighted voting game approach. 180-187 - Serge Vaudenay:

Privacy failure in the public-key distance-bounding protocols. 188-193 - Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson

, Mohammad Reza Aref:
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes. 194-202 - Mehmet Tahir Sandikkaya

, Tolga Ovatman
, Ali Emre Harmanci:
Design and formal verification of a cloud compliant secure logging mechanism. 203-214 - Wentan Yi, Shaozhen Chen:

Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI. 215-221
Volume 10, Number 5, September 2016
- Nele Mentens

, Damien Sauveron, José M. Sierra
, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. 223-224 - Puliparambil Megha Mukundan, Sindhu Manayankath

, Chungath Srinivasan, Madathil Sethumadhavan
:
Hash-One: a lightweight cryptographic hash function. 225-231 - Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont

:
Compact and low-power ASIP design for lightweight PUF-based authentication protocols. 232-241 - Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro

, Debdeep Mukhopadhyay:
Template attack on SPA and FA resistant implementation of Montgomery ladder. 245-251 - Vinoth Chakkaravarthy Ganesan

, Alli Periyakaruppan, Raja Lavanya
:
Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in IPv6 multicast networks. 252-261 - Collins Mtita, Maryline Laurent

, Jacques Delort:
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. 262-271 - Goutham Reddy Alavalapati

, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. 272-282
Volume 10, Number 6, November 2016
- Jonathan Katz:

Guest Editorial. 287 - Michel Abdalla

, Fabrice Benhamouda
, David Pointcheval
:
Public-key encryption indistinguishable under plaintext-checkable attacks. 288-303 - Felix Heuer, Tibor Jager, Sven Schäge

, Eike Kiltz
:
Selective opening security of practical public-key encryption schemes. 304-318 - David Bernhard, Marc Fischlin, Bogdan Warinschi:

Adaptive proofs of knowledge in the random oracle model. 319-331 - Sébastien Canard, David Pointcheval

, Olivier Sanders, Jacques Traoré:
Divisible e-cash made practical. 332-347 - Emmanuela Orsini

, Joop van de Pol, Nigel P. Smart:
Bootstrapping BGV ciphertexts with a wider choice of p and q. 348-357 - Gilles Barthe

, Edvard Fagerholm, Dario Fiore, Andre Scedrov
, Benedikt Schmidt, Mehdi Tibouchi
:
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds. 358-371 - Nico Döttling:

Low Noise LPN: Key dependent message secure public key encryption an sample amplification. 372-385 - Qutaiba Ibrahim Ali

:
Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system. 386-402 - Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu:

Public key cryptosystems secure against memory leakage attacks. 403-412 - Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:

Method for detecting text information leakage in electromagnetic radiation from a computer display. 413-417 - Liang Deng, Qingkai Zeng:

Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware. 418-424 - Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:

Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. 425-432 - Yang Liu, Xiaojun Tong:

Hyperchaotic system-based pseudorandom number generator. 433-441 - Yanqing Yao, Zhoujun Li

:
Security of weak secrets based cryptographic primitives via the Rényi entropy. 442-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














