Journal: IET Information Security

Volume 10, Issue 2

53 -- 59Yang Tan, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li. Building a new secure variant of Rainbow signature scheme
60 -- 68Esther Palomar, Lorena González-Manzano, Almudena Alcaide, Álvaro Galán. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
69 -- 79Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang. Short and provably secure designated verifier proxy signature scheme
80 -- 86Yang Lu, Jiguo Li. Improved certificate-based signature scheme without random oracles
87 -- 94Lingfeng Liu, Suoxia Miao, Hanping Hu, Ya Shuang Deng. Pseudorandom bit generator based on non-stationary logistic maps
95 -- 103Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu. Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys
104 -- 111Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang. n+1