Journal: IET Information Security

Volume 7, Issue 2

0 -- 0Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks
0 -- 0Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan. uCloud: a user-centric key management scheme for cloud data protection
0 -- 0Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang. Fair (t, n) threshold secret sharing scheme
0 -- 0Salman Niksefat, Babak Sadeghiyan, Payman Mohassel. Oblivious decision program evaluation
0 -- 0Khusvinder Gill, Shuang-Hua Yang, Wan-liang Wang. Secure remote access to home automation networks
0 -- 0Xixiang Lv, Hui Li. Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
0 -- 0Lo'ai Ali Tawalbeh, Moad Mowafi, Walid Aljoby. Use of elliptic curve cryptography for multimedia encryption
0 -- 0Fen Miao, Shu-Di Bao, Ye Li. Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security
0 -- 0Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall. Antivirus performance characterisation: system-wide view
0 -- 0Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu. m) using Hankel matrix and Karatsuba algorithm
0 -- 0Yongzhuang Wei, Enes Pasalic. On the approximation of S-boxes via Maiorana-McFarland functions
0 -- 0Debiao He, Baojun Huang, Jianhua Chen. New certificateless short signature scheme