Journal: IET Information Security

Volume 10, Issue 1

1 -- 7Clémentine Gritti, Willy Susilo, Thomas Plantard. Logarithmic size ring signatures without random oracles
8 -- 17Weiqiang Wen, Libin Wang, Jiaxin Pan. Unified security model of authenticated key exchange with specific adversarial capabilities
18 -- 27Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu. Random table and hash coding-based binary code obfuscation against stack trace analysis
28 -- 32Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou. Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems
33 -- 36José Luis Salazar, José Luis Tornos, Joan Josep Piles. Efficient ways of prime number generation for ring signatures
37 -- 44Hao Wu, Xianglei Dang, Lidong Wang, Longtao He. Information fusion-based method for distributed domain name system cache poisoning attack detection and identification
45 -- 52Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu. Robustness of text-based completely automated public turing test to tell computers and humans apart