Journal: IET Information Security

Volume 1, Issue 4

143 -- 151Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. Comparing and debugging firewall rule tables
152 -- 162Chunxiao Chigan, Leiyuan Li, Yinghua Ye. Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks
163 -- 166O. O. Obi, Falah H. Ali, Elias Stipidis. Explicit expression for decryption in a generalisation of the paillier scheme
167 -- 173Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan. Mobile ip registration in certificateless public key infrastructure