Journal: IET Information Security

Volume 11, Issue 5

223 -- 229Xianfang Wang, Fang-Wei Fu. Multi-receiver authentication scheme with hierarchical structure
230 -- 234Dong Yang, Wen-Feng Qi, Tian Tian. All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers
235 -- 242Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu. Dynamic authenticated data structures with access control for outsourcing data stream
243 -- 249Zheng Yang, Junyu Lai, Wanping Liu, Chao Liu, Song Luo. SignORKE: improving pairing-based one-round key exchange without random oracles
250 -- 255Yining Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng. A secure data backup scheme using multi-factor authentication
256 -- 260Caixue Zhou, Zongmin Cui. Certificate-based signature scheme in the standard model
261 -- 266Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie 0003. Constructions of involutions with optimal minimum degree
267 -- 272Santanu Sarkar. Results on significant anomalies of state values after key scheduling algorithm in RC4
273 -- 276Lei Cheng, Chao Li. Revisiting impossible differentials of MARS-like structures
277 -- 286Kai Fu, Ling Sun, Meiqin Wang. New integral attacks on SIMON
287 -- 293Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata. Computational SS and conversion protocols in both active and passive settings
294 -- 300Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. Migrating from RBAC to temporal RBAC