Journal: IET Information Security

Volume 1, Issue 4

143 -- 151Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. Comparing and debugging firewall rule tables
152 -- 162Chunxiao Chigan, Leiyuan Li, Yinghua Ye. Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks
163 -- 166O. O. Obi, Falah H. Ali, Elias Stipidis. Explicit expression for decryption in a generalisation of the paillier scheme
167 -- 173Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan. Mobile ip registration in certificateless public key infrastructure

Volume 1, Issue 3

97 -- 105Li Zhang, Weiwei Xiao, Zhen Ji. Local affine transform invariant image watermarking by Krawtchouk moment invariants
106 -- 110Marc Joye, Pascal Manet, Jean-Baptiste Rigaud. Strengthening hardware AES implementations against fault attacks
111 -- 118Atefeh Mashatan, Douglas R. Stinson. Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions
119 -- 127Peter Mell, Karen Scarfone. Improving the Common Vulnerability Scoring System
128 -- 133Marco Bucci, Raimondo Luzzi, Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti. Testing power-analysis attack susceptibility in register-transfer level designs
134 -- 141C. M. Lo, Tzonelih Hwang, Chuan-Ming Li. Revocation-free public-key encryption based on security-mediated public-key infrastructure

Volume 1, Issue 2

47 -- 52Martin Hell, Thoinas Johansson. Cryptanalysis of Achterbahn-128/80
53 -- 57Liam Keliher, Jiayuan Sui. Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard
59 -- 64David Naccache. Secure and practical identity-based encryption
65 -- 81Xinxin Fan, Thomas J. Wollinger, Guang Gong. Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields
83 -- 90Marcel Fernandez, Miguel Soriano, Josep Cotrina. Tracing illegal redistribution using errors-anderasures and side information decoding algorithms
91 -- 95ShaoWei Weng, Youping Zhao, Jeng-Shyang Pan. Reversible watermarking resistant to cropping attack

Volume 1, Issue 1

1 -- 10Tim Good, Mohammed Benaissa. Pipelined AES on FPGA with support for feedback modes (in a multi-channel environment)
11 -- 17Joan Daemen, Vincent Rijmen. Plateau characteristics
19 -- 26Byungchun Chung, Hong Gil Kim, Hyunsoo Yoon. Improved base-φ expansion method for Koblitz curves over optimal extension fields
27 -- 35Joon S. Park, Gaeil An, Deepak Chandra. Trusted P2P computing environments with role-based access control
37 -- 42Jin Cong, Zhiguo Qu, Zhongmei Zhang, Yan Jiang. Web dual watermarking technology using an XML document
43 -- 45Tzonelih Hwang, Kuo-Chang Lee. EPR quantum key distribution protocols with potential 100% qubit efficiency