


default search action
IET Information Security, Volume 8
Volume 8, Number 1, January 2014
- Lathies Bhasker:

Genetically derived secure cluster-based data aggregation in wireless sensor networks. 1-7 - Huixian Li, Liaojun Pang

:
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme. 8-11 - Dejun Mu, Wei Hu, Baolei Mao

, Bo Ma:
A bottom-up approach to verifiable embedded system information flow security. 12-17 - Zongqu Zhao, Junfeng Wang, Jinrong Bai:

Malware detection method based on the control-flow construct feature of software. 18-24 - Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:

Analysis of Bayesian classification-based approaches for Android malware detection. 25-36 - Yan-Xiao Liu:

Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)]. 37-41 - Konstantinos G. Kyriakopoulos

, Francisco J. Aparicio-Navarro
, David J. Parish:
Manual and Automatic assigned thresholds in multi-layer data fusion intrusion detection system for 802.11 attacks. 42-50
Volume 8, Number 2, March 2014
- Audun Jøsang

:
Identity management and trusted interaction in internet and mobile computing. 67-79 - Zurina Mohd Hanapi

, Mahamod Ismail
:
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol. 80-87 - Hui Xia, Zhiping Jia, Edwin Hsing-Mean Sha:

Research of trust model based on fuzzy theory in mobile ad hoc networks. 88-103 - Jenq-Shiou Leu, Wen-Bin Hsieh

:
Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards. 104-113 - Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer

:
Identity-based remote data possession checking in public clouds. 114-121 - Jerzy Kaczmarek, Michal R. Wróbel

:
Operating system security by integrity checking and recovery using write-protected storage. 122-131 - Ronald Petrlic, Christoph Sorge:

Establishing user trust in automated teller machine integrity. 132-139 - Hao Bai, Changzhen Hu, Xiao-chuan Jing, Ning Li, Xiaoyin Wang:

Approach for malware identification using dynamic behaviour and outcome triggering. 140-151
Volume 8, Number 3, May 2014
- Rami Mustafa A. Mohammad

, Fadi A. Thabtah, Lee McCluskey
:
Intelligent rule-based phishing websites classification. 153-160 - Xin Wang, Chaowei Yuan:

Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism. 161-170 - Lein Harn:

Generalised cheater detection and identification. 171-178 - Pandi Vijayakumar

, Sundan Bose, Arputharaj Kannan
:
Chinese remainder theorem based centralised group key management for secure multicast communication. 179-187 - Abdulah Abdulah Zadeh, Howard M. Heys

:
Simple power analysis applied to nonlinear feedback shift registers. 188-198 - Haojie Shen, Li Zhuo, Yingdi Zhao:

An efficient motion reference structure based selective encryption algorithm for H.264 videos. 199-206 - Hamid Mala:

Biclique-based cryptanalysis of the block cipher SQUARE. 207-212 - Xing-Yuan Wang, Sheng-Xian Gu:

New chaotic encryption algorithm based on chaotic sequence and plain text. 213-216
Volume 8, Number 4, July 2014
- Ximeng Liu

, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu:
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. 217-223 - Mitra Fatemi, Reza Ghasemi, Taraneh Eghlidos, Mohammad Reza Aref:

Efficient multistage secret sharing scheme using bilinear map. 224-229 - Hongzhen Du, Qiaoyan Wen:

Security analysis of two certificateless short signature schemes. 230-233 - V. Rajamanickam, Duraisamy Veerappan:

Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks. 234-239 - Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:

Anonymous encryption with partial-order subset delegation and its application in privacy email systems. 240-249 - Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:

Dynamic rule and rule-field optimisation for improving firewall performance and security. 250-257
Volume 8, Number 5, September 2014
- Shao-zhen Chen, Tian-min Xu:

Biclique key recovery for ARIA-256. 259-264 - Jiao Du, Qiaoyan Wen, Jie Zhang, Shanqi Pang:

Constructions of resilient rotation symmetric boolean functions on given number of variables. 265-272 - Chaowen Guan

, Jian Weng
, Robert H. Deng
, Min-Rong Chen, Dehua Zhou:
Unforgeability of an improved certificateless signature scheme in the standard model. 273-276 - Ø. Marøy, M. Gudmundsen, Lars Lydersen, Johannes Skaar

:
Error estimation, error correction and verification in quantum key distribution. 277-282
Volume 8, Number 6, November 2014
- Dylan Clarke, Feng Hao

:
Cryptanalysis of the dragonfly key exchange protocol. 283-289 - Yi Jiang, Wei Cheng

, Xiaojiang Du:
Group-based key array authentication protocol in radio frequency identification systems. 290-296 - Guangpu Gao, Thomas W. Cusick, Wenfen Liu:

Families of rotation symmetric functions with useful cryptographic properties. 297-302 - Lein Harn:

Comments on 'fair (t, n) threshold secret sharing scheme'. 303-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














