Stop the war!
default search action
IET Information Security, Volume 7
Volume 7, Number 1, 2013
- Chun-Ta Li:
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. 3-10
- Kun Peng:
Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. 11-21
- Yueming Deng, Guojun Wang, Jiannong Cao, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. 22-29
- Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. 30-38
- Xiaoyong Li, Junping Du:
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. 39-50
- Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. 51-59
Volume 7, Number 2, June 2013
- Xixiang Lv, Hui Li:
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
- Lo'ai Ali Tawalbeh, Moad Mowafi, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption.
- Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu:
Low space-complexity digit-serial dual basis systolic multiplier over Galois field GF(2m) using Hankel matrix and Karatsuba algorithm.
- Fen Miao, Shu-Di Bao, Ye Li:
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security.
- Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues:
IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks.
- Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme.
- Debiao He, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme.
- Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang:
Secure remote access to home automation networks.
- Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall:
Antivirus performance characterisation: system-wide view.
- Yongzhuang Wei, Enes Pasalic:
On the approximation of S-boxes via Maiorana-McFarland functions.
- Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan:
uCloud: a user-centric key management scheme for cloud data protection.
- Salman Niksefat, Babak Sadeghiyan, Payman Mohassel:
Oblivious decision program evaluation.
Volume 7, Number 3, September 2013
- Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. 165-171
- Jung-San Lee, Wei-Chiang Kao, Bo Li:
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness. 172-180
- Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. 181-188
- Hung-Wen Yang, Chou Chen Yang, Woei Lin:
Enhanced digital rights management authentication scheme based on smart card. 189-194
- Yoon-Ho Choi, Seung-Woo Seo:
BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching. 195-202
- Muthumanickam Gunasekaran, Kandhasamy Premalatha:
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. 203-211
- Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes. 212-220
- Dimitrios S. Karas, George K. Karagiannidis, Robert Schober:
Channel level crossing-based security for communications over fading channels. 221-229
- Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri:
Superpoly algebraic normal form monomial test on Trivium. 230-238
- Tsu-Yang Wu, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. 239-246
- Hsiu-lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei-Kuan Shih:
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. 247-252
- Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. 253-263
Volume 7, Number 4, December 2013
- Jianhua Li, Hui Liu:
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. 265-270
- Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li:
New certificateless public key encryption scheme without pairing. 271-276
- Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa:
Link quality-based cache replacement technique in mobile ad hoc network. 277-282
- Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. 283-292
- Jialin Huang, Xuejia Lai:
Chosen-plaintext linear attacks on Serpent. 293-299
- Angela Piper, Reihaneh Safavi-Naini:
Scalable fragile watermarking for image authentication. 300-311
- Qassim Al Mahmoud:
Polynomial differential-based strong (n, t, n)-verifiable secret sharing. 312-317
- Fang Ren, Jiulun Fan:
An adaptive distributed certificate management scheme for space information network. 318-326
- Brendan Cronin, Xiaojun Wang:
Hardware acceleration of regular expression repetitions in deep packet inspection. 327-335
- Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. 343-348
- Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu:
Systemic threats to hypervisor non-control data. 349-354
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.