Journal: IET Information Security

Volume 7, Issue 4

265 -- 270Jianhua Li, Hui Liu. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
271 -- 276Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li. New certificateless public key encryption scheme without pairing
277 -- 282Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa. Link quality-based cache replacement technique in mobile ad hoc network
283 -- 292Ping Chen, Rui Wu, Bing Mao. JITSafe: a framework against Just-in-time spraying attacks
293 -- 299Jialin Huang, Xuejia Lai. Chosen-plaintext linear attacks on Serpent
300 -- 311Angela Piper, Reihaneh Safavi-Naini. Scalable fragile watermarking for image authentication
312 -- 317Qassim Al Mahmoud. Polynomial differential-based strong (n, t, n)-verifiable secret sharing
318 -- 326Fang Ren, Jiulun Fan. An adaptive distributed certificate management scheme for space information network
327 -- 335Brendan Cronin, Xiaojun Wang. Hardware acceleration of regular expression repetitions in deep packet inspection
343 -- 348Dong Jiao, MingChu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui. Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management
349 -- 354Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu. Systemic threats to hypervisor non-control data