default search action
IET Information Security, Volume 7
Volume 7, Number 1, 2013
- Chun-Ta Li:
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. 3-10 - Kun Peng:
Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. 11-21 - Yueming Deng, Guojun Wang, Jiannong Cao, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. 22-29 - Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. 30-38 - Xiaoyong Li, Junping Du:
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. 39-50 - Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. 51-59
Volume 7, Number 2, June 2013
- Xixiang Lv, Hui Li:
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. - Lo'ai Ali Tawalbeh, Moad Mowafi, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption. - Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu:
Low space-complexity digit-serial dual basis systolic multiplier over Galois field GF(2m) using Hankel matrix and Karatsuba algorithm. - Fen Miao, Shu-Di Bao, Ye Li:
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security. - Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues:
IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. - Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme. - Debiao He, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme. - Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang:
Secure remote access to home automation networks. - Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall:
Antivirus performance characterisation: system-wide view. - Yongzhuang Wei, Enes Pasalic:
On the approximation of S-boxes via Maiorana-McFarland functions. - Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan:
uCloud: a user-centric key management scheme for cloud data protection. - Salman Niksefat, Babak Sadeghiyan, Payman Mohassel:
Oblivious decision program evaluation.
Volume 7, Number 3, September 2013
- Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. 165-171 - Jung-San Lee, Wei-Chiang Kao, Bo Li:
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness. 172-180 - Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. 181-188 - Hung-Wen Yang, Chou Chen Yang, Woei Lin:
Enhanced digital rights management authentication scheme based on smart card. 189-194 - Yoon-Ho Choi, Seung-Woo Seo:
BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching. 195-202 - Muthumanickam Gunasekaran, Kandhasamy Premalatha:
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. 203-211 - Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes. 212-220 - Dimitrios S. Karas, George K. Karagiannidis, Robert Schober:
Channel level crossing-based security for communications over fading channels. 221-229 - Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri:
Superpoly algebraic normal form monomial test on Trivium. 230-238 - Tsu-Yang Wu, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. 239-246 - Hsiu-lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei-Kuan Shih:
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. 247-252 - Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. 253-263
Volume 7, Number 4, December 2013
- Jianhua Li, Hui Liu:
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. 265-270 - Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li:
New certificateless public key encryption scheme without pairing. 271-276 - Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa:
Link quality-based cache replacement technique in mobile ad hoc network. 277-282 - Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. 283-292 - Jialin Huang, Xuejia Lai:
Chosen-plaintext linear attacks on Serpent. 293-299 - Angela Piper, Reihaneh Safavi-Naini:
Scalable fragile watermarking for image authentication. 300-311 - Qassim Al Mahmoud:
Polynomial differential-based strong (n, t, n)-verifiable secret sharing. 312-317 - Fang Ren, Jiulun Fan:
An adaptive distributed certificate management scheme for space information network. 318-326 - Brendan Cronin, Xiaojun Wang:
Hardware acceleration of regular expression repetitions in deep packet inspection. 327-335 - Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. 343-348 - Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu:
Systemic threats to hypervisor non-control data. 349-354
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.