


default search action
IET Information Security, Volume 4
Volume 4, Number 1, 2010
- Mohammad Hassan Shirali-Shahreza

, Sajad Shirali-Shahreza:
Real-time and MPEG-1 layer III compression resistant steganography in speech. 1-7 - Haining Fan, Jia-Guang Sun, Ming Gu, Kwok-Yan Lam:

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms. 8-14 - Jing Liu, Laurent Vigneron:

Design and verification of a non-repudiation protocol based on receiver-side smart card. 15-29 - Deniz Karakoyunlu, Frank Kagan Gürkaynak, Berk Sunar, Yusuf Leblebici:

Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. 30-43
Volume 4, Number 2, 2010
- Bin Wang:

On the security of an identity-based proxy multi-signature scheme. 45-48 - Vesselin Velichkov, Vincent Rijmen

, Bart Preneel
:
Algebraic cryptanalysis of a small-scale version of stream cipher Lex. 49-61 - Feng Hao

, Peter Y. A. Ryan
, Piotr Zielinski
:
Anonymous voting by two-round public discussion. 62-67 - Kun Wang, Meng Wu:

Cooperative communications based on trust model for mobile ad hoc networks. 68-79 - Yoones Asgharzadeh Sekhavat

, Mohammad Fathian:
Mining frequent itemsets in the presence of malicious participants. 80-92 - Mitra Fatemi, Somayeh Salimi, Ahmad Salahi:

Anonymous roaming in universal mobile telecommunication system mobile networks. 93-103 - Wenqiang Wang, Shaozhen Chen:

Attribute-based ring signature scheme with constant-size signature. 104-110
Volume 4, Number 3, 2010
- Wen-Tzeng Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou:

Concurrent error detection and correction in a polynomial basis multiplier over GF(2m). 111-124 - Philippe Bulens, François-Xavier Standaert

, Jean-Jacques Quisquater:
How to strongly link data and its medium: the paper case. 125-136 - Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene:

Secure private fragile watermarking scheme with improved tampering localisation accuracy. 137-148 - Joan Daemen, Vincent Rijmen

:
Refinements of the ALRED construction and MAC security claims. 149-157 - A. Utku Yargiçoglu, Hakki Gökhan Ilk

:
Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation. 158-166 - Xianfeng Zhao

, Dengguo Feng:
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round. 167-184
Volume 4, Number 4, 2010
- Habib F. Rashvand, Khaled Salah

, José M. Alcaraz Calero
, Lein Harn:
Distributed security for multi-agent systems - review and applications. 188-201 - Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger:

Unconditionally secure social secret sharing scheme. 202-211 - Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang:

Trust-based on-demand multipath routing in mobile ad hoc networks. 212-232 - Stephen Bishop, Hamed Okhravi

, Shahram Rahimi, Yung-Chuan Lee:
Covert channel resistant information leakage protection using a multi-agent architecture. 233-247 - Chih-Ta Yen, Tzong-Chen Wu, Ming-Huang Guo, Chuan-Kai Yang, Han-Chieh Chao

:
Digital product transaction mechanism for electronic auction environment. 248-257 - Pitipatana Sakarindr, Nirwan Ansari

:
Survey of security services on group communications. 258-272 - Christian Damsgaard Jensen

:
Supporting multi-agent reputation calculation in the Wikipedia Recommender System. 273-282 - Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta:

Integrated security analysis framework for an enterprise network - a formal approach. 283-300 - Morteza Amini

, Rasool Jalili:
Multi-level authorisation model and framework for distributed semantic-aware environments. 301-321 - Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal, Kenneth L. Calvert:

Efficient proxy signatures based on trapdoor hash functions. 322-332 - Zubair A. Baig

, Khaled Salah
:
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks. 333-343 - Meng Yu, Wanyu Zang, Peng Liu:

Recovery of data integrity under multi-tier architectures. 344-351 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao

:
Cluster-based secure communication mechanism in wireless ad hoc networks. 352-360 - Yi-Ying Zhang, Han-Chieh Chao

, Min Chen, Lei Shu
, Chulhyun Park, Myong-Soon Park:
Outlier detection and countermeasure for hierarchical wireless sensor networks. 361-373 - Sudip Misra, P. Venkata Krishna

, Kiran Isaac Abraham:
Adaptive link-state routing and intrusion detection in wireless mesh networks. 374-389 - Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:

Physical layer assisted authentication for distributed ad hoc wireless sensor networks. 390-396 - Fatemeh Raji

, Behrouz Tork Ladani
:
Anonymity and security for autonomous mobile agents. 397-410 - José M. Alcaraz Calero

, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Towards an authorisation model for distributed systems based on the Semantic Web. 411-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














