Journal: IET Information Security

Volume 9, Issue 4

203 -- 208Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim. Hijacking the Vuze BitTorrent network: all your hop are belong to us
209 -- 218Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun. Differential fault analysis on LED using Super-Sbox
219 -- 222Weijia Xue, Xuejia Lai. Impossible differential cryptanalysis of MARS-like structures
223 -- 233Amir Salah Elsafrawey, Emad S. Hassan, Moawad I. Dessouky. Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
234 -- 239Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
240 -- 247Keshnee Padayachee. Aspectising honeytokens to contain the insider threat
248 -- 255Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami. Distributed key generation protocol with hierarchical threshold access structure