Journal: IET Information Security

Volume 5, Issue 3

129 -- 134Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba. Impossible differential cryptanalysis of reduced-round Camellia-256
135 -- 144Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera. Approach to security assessment of critical infrastructures' information systems
145 -- 151Ashok Kumar Das. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
152 -- 162W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, S. Y. Tan. m)
163 -- 169Luis Javier García-Villalba, Julián García Matesanz, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco. Secure extension to the optimised link state routing protocol
170 -- 180Xinchao Li, Ju Liu, Jiande Sun, Xiaohui Yang, Wei Liu. Step-projection-based spread transform dither modulation