Journal: IET Information Security

Volume 4, Issue 3

111 -- 124W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou. m)
125 -- 136Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater. How to strongly link data and its medium: the paper case
137 -- 148Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene. Secure private fragile watermarking scheme with improved tampering localisation accuracy
149 -- 157Joan Daemen, Vincent Rijmen. Refinements of the ALRED construction and MAC security claims
158 -- 166A. U. Yargiçoglu, Hakki Gökhan Ilk. Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation
167 -- 184Xianfeng Zhao, Dengguo Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round