Stop the war!
Остановите войну!
for scientists:
default search action
IET Information Security, Volume 10
Volume 10, Number 1, January 2016
- Clémentine Gritti, Willy Susilo, Thomas Plantard:
Logarithmic size ring signatures without random oracles. 1-7 - Weiqiang Wen, Libin Wang, Jiaxin Pan:
Unified security model of authenticated key exchange with specific adversarial capabilities. 8-17 - Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu:
Random table and hash coding-based binary code obfuscation against stack trace analysis. 18-27 - Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou:
Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems. 28-32 - José Luis Salazar, José Luis Tornos, Joan Josep Piles:
Efficient ways of prime number generation for ring signatures. 33-36 - Hao Wu, Xianglei Dang, Lidong Wang, Longtao He:
Information fusion-based method for distributed domain name system cache poisoning attack detection and identification. 37-44 - Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu:
Robustness of text-based completely automated public turing test to tell computers and humans apart. 45-52
Volume 10, Number 2, March 2016
- Yang Tan, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li:
Building a new secure variant of Rainbow signature scheme. 53-59 - Esther Palomar, Lorena González-Manzano, Almudena Alcaide, Álvaro Galán:
Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management. 60-68 - Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang:
Short and provably secure designated verifier proxy signature scheme. 69-79 - Yang Lu, Jiguo Li:
Improved certificate-based signature scheme without random oracles. 80-86 - Lingfeng Liu, Suoxia Miao, Hanping Hu, Ya Shuang Deng:
Pseudorandom bit generator based on non-stationary logistic maps. 87-94 - Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. 95-103 - Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang:
Linear complexity of generalised cyclotomic quaternary sequences of length 2p m+1 q n+1. 104-111
Volume 10, Number 3, May 2016
- Gareth Owen, Nick Savage:
Empirical analysis of Tor Hidden Services. 113-118 - Xiaoming Wang, Yanchun Lin, Yu Fang:
Authenticating multi-dimensional query results in outsourced database. 119-124 - Stavros Papadopoulos, Konstantinos Moustakas, Anastasios Drosou, Dimitrios Tzovaras:
Border gateway protocol graph: detecting and visualising internet routing anomalies. 125-133 - Quanqiang Zhou:
Supervised approach for detecting average over popular items attack in collaborative recommender systems. 134-141 - Yonglin Hao:
Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers. 142-151 - Houzhen Wang, Huanguo Zhang, Shaohua Tang:
Key recovery on several matrix public-key encryption schemes. 152-155 - Seyed Amir Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia:
Covert communications through mobile voice channels. 156-164
Volume 10, Number 4, July 2016
- Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref:
Dynamic cube attack on Grain-v1. 165-172 - Bin Wang:
Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system. 173-179 - Sungwook Kim:
Effective certificate revocation scheme based on weighted voting game approach. 180-187 - Serge Vaudenay:
Privacy failure in the public-key distance-bounding protocols. 188-193 - Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson, Mohammad Reza Aref:
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes. 194-202 - Mehmet Tahir Sandikkaya, Tolga Ovatman, Ali Emre Harmanci:
Design and formal verification of a cloud compliant secure logging mechanism. 203-214 - Wentan Yi, Shaozhen Chen:
Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI. 215-221
Volume 10, Number 5, September 2016
- Nele Mentens, Damien Sauveron, José M. Sierra, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. 223-224 - Puliparambil Megha Mukundan, Sindhu Manayankath, Chungath Srinivasan, Madathil Sethumadhavan:
Hash-One: a lightweight cryptographic hash function. 225-231 - Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont:
Compact and low-power ASIP design for lightweight PUF-based authentication protocols. 232-241 - Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay:
Template attack on SPA and FA resistant implementation of Montgomery ladder. 245-251 - Vinoth Chakkaravarthy Ganesan, Alli Periyakaruppan, Raja Lavanya:
Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in IPv6 multicast networks. 252-261 - Collins Mtita, Maryline Laurent, Jacques Delort:
Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers. 262-271 - Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo:
Lightweight authentication with key-agreement protocol for mobile network environment using smart cards. 272-282
Volume 10, Number 6, November 2016
- Jonathan Katz:
Guest Editorial. 287 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Public-key encryption indistinguishable under plaintext-checkable attacks. 288-303 - Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz:
Selective opening security of practical public-key encryption schemes. 304-318 - David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive proofs of knowledge in the random oracle model. 319-331 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:
Divisible e-cash made practical. 332-347 - Emmanuela Orsini, Joop van de Pol, Nigel P. Smart:
Bootstrapping BGV ciphertexts with a wider choice of p and q. 348-357 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds. 358-371 - Nico Döttling:
Low Noise LPN: Key dependent message secure public key encryption an sample amplification. 372-385 - Qutaiba Ibrahim Ali:
Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system. 386-402 - Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu:
Public key cryptosystems secure against memory leakage attacks. 403-412 - Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang:
Method for detecting text information leakage in electromagnetic radiation from a computer display. 413-417 - Liang Deng, Qingkai Zeng:
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware. 418-424 - Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:
Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. 425-432 - Yang Liu, Xiaojun Tong:
Hyperchaotic system-based pseudorandom number generator. 433-441 - Yanqing Yao, Zhoujun Li:
Security of weak secrets based cryptographic primitives via the Rényi entropy. 442-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.