Journal: IET Information Security

Volume 15, Issue 3

205 -- 222Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari. Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures
223 -- 230Chris J. Mitchell. How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes
231 -- 246Sébastien Canard, Chaoyun Li. Towards practical intrusion detection system over encrypted traffic
247 -- 255Manman Li, Shaozhen Chen. Improved meet-in-the-middle attacks on reduced-round Joltik-BC
256 -- 266Shivangi Shukla, Sankita J. Patel. Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment