Journal: IET Information Security

Volume 3, Issue 3

75 -- 113Manachai Toahchoodee, Indrakshi Ray. Using alloy to analyse a spatio-temporal access control model supporting delegation
114 -- 118Ameneh Farhadian, Mohammad Reza Aref. Efficient method for simplifying and approximating the s-boxes based on power functions
119 -- 127Aggelos Kiayias, Hong-Sheng Zhou. Hidden identity-based signatures