


default search action
IET Information Security, Volume 7
Volume 7, Number 1, 2013
- Chun-Ta Li

:
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. 3-10 - Kun Peng:

Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. 11-21 - Yueming Deng, Guojun Wang, Jiannong Cao

, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. 22-29 - Xin Huang, Bangdao Chen, Andrew Markham

, Qinghua Wang
, Zheng Yan
, A. W. Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. 30-38 - Xiaoyong Li

, Junping Du:
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. 39-50 - Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:

CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. 51-59
Volume 7, Number 2, June 2013
- Xixiang Lv, Hui Li:

Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. - Lo'ai Ali Tawalbeh

, Moad Mowafi
, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption. - Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee

, Yong Huan Liu:
Low space-complexity digit-serial dual basis systolic multiplier over Galois field GF(2m) using Hankel matrix and Karatsuba algorithm. - Fen Miao, Shu-Di Bao, Ye Li:

Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security. - Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu

, Joel J. P. C. Rodrigues:
IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. - Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang

:
Fair (t, n) threshold secret sharing scheme. - Debiao He

, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme. - Khusvinder Gill, Shuang-Hua Yang

, Wan-Liang Wang:
Secure remote access to home automation networks. - Mohammed I. Al-Saleh

, Antonio M. Espinoza, Jedidiah R. Crandall:
Antivirus performance characterisation: system-wide view. - Yongzhuang Wei, Enes Pasalic

:
On the approximation of S-boxes via Maiorana-McFarland functions. - Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan

:
uCloud: a user-centric key management scheme for cloud data protection. - Salman Niksefat, Babak Sadeghiyan, Payman Mohassel:

Oblivious decision program evaluation.
Volume 7, Number 3, September 2013
- Sedat Akleylek

, Murat Cenk
, Ferruh Özbudak
:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. 165-171 - Jung-San Lee, Wei-Chiang Kao, Bo Li:

Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness. 172-180 - Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang

:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. 181-188 - Hung-Wen Yang, Chou Chen Yang, Woei Lin:

Enhanced digital rights management authentication scheme based on smart card. 189-194 - Yoon-Ho Choi, Seung-Woo Seo:

BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching. 195-202 - Muthumanickam Gunasekaran

, Kandhasamy Premalatha
:
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. 203-211 - Marco Baldi

, Marco Bianchi, Franco Chiaraluce
:
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes. 212-220 - Dimitrios S. Karas, George K. Karagiannidis

, Robert Schober:
Channel level crossing-based security for communications over fading channels. 221-229 - Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri:

Superpoly algebraic normal form monomial test on Trivium. 230-238 - Tsu-Yang Wu

, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. 239-246 - Hsiu-lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei-Kuan Shih:

Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. 247-252 - Yu-Chi Chen

, Gwoboa Horng
, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. 253-263
Volume 7, Number 4, December 2013
- Jianhua Li, Hui Liu:

Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. 265-270 - Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li:

New certificateless public key encryption scheme without pairing. 271-276 - Jagadeesan Dhanapal

, Srinivasa Krishna Srivatsa:
Link quality-based cache replacement technique in mobile ad hoc network. 277-282 - Ping Chen, Rui Wu, Bing Mao:

JITSafe: a framework against Just-in-time spraying attacks. 283-292 - Jialin Huang, Xuejia Lai:

Chosen-plaintext linear attacks on Serpent. 293-299 - Angela Piper, Reihaneh Safavi-Naini:

Scalable fragile watermarking for image authentication. 300-311 - Qassim Al Mahmoud:

Polynomial differential-based strong (n, t, n)-verifiable secret sharing. 312-317 - Fang Ren, Jiulun Fan:

An adaptive distributed certificate management scheme for space information network. 318-326 - Brendan Cronin, Xiaojun Wang

:
Hardware acceleration of regular expression repetitions in deep packet inspection. 327-335 - Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. 343-348 - Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu:

Systemic threats to hypervisor non-control data. 349-354

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














