


default search action
IET Information Security, Volume 5
Volume 5, Number 1, 2011
- Saad M. Saad

:
Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification. 1-9 - Fangjun Huang, Weiqi Luo

, Jiwu Huang:
Steganalysis of JPEG steganography with complementary embedding strategy. 10-18 - Ning Chen, He-D. Xiao, Wanggen Wan:

Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients. 19-25 - Yongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip:

Steganalysis of compressed speech to detect covert voice over Internet protocol channels. 26-32 - Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin:

Self-checking alternating logic bit-parallel gaussian normal basis multiplier with type-t. 33-42 - Te-Cheng Hsu, Wen-Shyong Hsieh, John Y. Chiang, Tung-Shih Su:

New watermark-removal method based on Eigen-image energy. 43-50 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:

Cheating immune visual cryptography scheme. 51-59 - Mariano López-García, John Daugman, Enrique Cantó

:
Hardware-software co-design of an iris recognition algorithm. 60-68 - Yao-Hsin Chou, Chi-Yuan Chen, Han-Chieh Chao

, Jong Hyuk Park, Rui-Kai Fan:
Quantum entanglement and non-locality based secure computation for future communication. 69-79
Volume 5, Number 2, 2011
- Pei-Yu Lin

, Chin-Chen Chang:
Cheating resistance and reversibility-oriented secret sharing mechanism. 81-92 - Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:

Balanced rotation symmetric boolean functions with maximum algebraic immunity. 93-99 - Stefan Mangard, Elisabeth Oswald

, François-Xavier Standaert
:
One for all - all for one: unifying standard differential power analysis attacks. 100-110 - Ruilin Li, Bing Sun, Chao Li:

Impossible differential cryptanalysis of SPN ciphers. 111-120 - Feng Liu, Chuan Kun Wu:

Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. 121-128
Volume 5, Number 3, 2011
- Hamid Mala, Mohammad Dakhilalian

, Mohsen Shakiba:
Impossible differential cryptanalysis of reduced-round Camellia-256. 129-134 - Rafal Leszczyna

, Igor Nai Fovino, Marcelo Masera:
Approach to security assessment of critical infrastructures' information systems. 135-144 - Ashok Kumar Das

:
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. 145-151 - Wen-Tzeng Huang, Chih-Hsiang Chang, Che Wun Chiou, Sun-Yen Tan:

Non-XOR approach for low-cost bit-parallel polynomial basis multiplier over GF(2m). 152-162 - Luis Javier García-Villalba

, Julián García Matesanz, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco
:
Secure extension to the optimised link state routing protocol. 163-169 - Xinchao Li, Ju Liu, Jiande Sun, Xiaohui Yang, Wei Liu:

Step-projection-based spread transform dither modulation. 170-180
Volume 5, Number 4, 2011
- Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:

Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. 181-190 - Mostafa E. Saleh, A. Baith Mohamed, A. Abdel Nabi:

Eigenviruses for metamorphic virus recognition. 191-198 - Aleksandar Kircanski, Amr M. Youssef:

On the sliding property of SNOW 3 G and SNOW 2.0. 199-206 - Alexandra Boldyreva, Virendra Kumar

:
Provable-security analysis of authenticated encryption in Kerberos. 207-219 - Igor Santos

, Felix Brezo, Borja Sanz
, Carlos Laorden
, Pablo García Bringas
:
Using opcode sequences in single-class learning to detect unknown malware. 220-227 - Mahdi Sajadieh

, Mohammad Dakhilalian
, Hamid Mala:
Perfect involutory diffusion layers based on invertibility of some linear functions. 228-236

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














