Journal: IET Information Security

Volume 6, Issue 3

123 -- 130Chin-Ling Chen, Jyun-Jie Liao. Fair offline digital content transaction system
131 -- 140Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao. Regression-based trust model for mobile ad hoc networks
141 -- 148Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar. Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
149 -- 156Changhua Sun, Chengchen Hu, Bin Liu 0001. 2: effective SYN flood detection against skillful spoofs
157 -- 170Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin, Chiou-Yng Lee. m)
171 -- 182Qutaiba Ibrahim Ali, S. Iazim. Design and implementation of an embedded intrusion detection system for wireless applications
183 -- 189Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee Cheon Chui. Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers
190 -- 201Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref. Simultaneously generating multiple keys in a four-terminal network
202 -- 211Iksu Kim, MyungHo Kim. Agent-based honeynet framework for protecting servers in campus networks
212 -- 218Zhijun Li, Guang Gong. C entity authentication for low-cost pervasive devices
219 -- 227Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas. Long-term preservation of digital signatures for multiple groups of related documents
228 -- 238Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim. Cryptanalysis of reduced versions of the Camellia block cipher