Journal: IET Information Security

Volume 4, Issue 4

188 -- 201Habib F. Rashvand, Khaled Salah, Jose M. Alcaraz Calero, Lein Harn. Distributed security for multi-agent systems - review and applications
202 -- 211Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger. Unconditionally secure social secret sharing scheme
212 -- 232Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang. Trust-based on-demand multipath routing in mobile ad hoc networks
233 -- 247Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee. Covert channel resistant information leakage protection using a multi-agent architecture
248 -- 257Chih-Ta Yen, Tzong-Chen Wu, Ming-Huang Guo, Chuan-Kai Yang, Han-Chieh Chao. Digital product transaction mechanism for electronic auction environment
258 -- 272Pitipatana Sakarindr, Nirwan Ansari. Survey of security services on group communications
273 -- 282Christian Damsgaard Jensen. Supporting multi-agent reputation calculation in the Wikipedia Recommender System
283 -- 300Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta. Integrated security analysis framework for an enterprise network - a formal approach
301 -- 321Morteza Amini, Rasool Jalili. Multi-level authorisation model and framework for distributed semantic-aware environments
322 -- 332Santosh Chandrasekhar, Saikat Chakrabarti 0002, Mukesh Singhal, Kenneth L. Calvert. Efficient proxy signatures based on trapdoor hash functions
333 -- 343Zubair A. Baig, Khaled Salah. Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks
344 -- 351Meng Yu, Wanyu Zang, Peng Liu. Recovery of data integrity under multi-tier architectures
352 -- 360Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. Cluster-based secure communication mechanism in wireless ad hoc networks
361 -- 373Yi-Ying Zhang, Han-Chieh Chao, Min Chen, Lei Shu, Chulhyun Park, Myong-Soon Park. Outlier detection and countermeasure for hierarchical wireless sensor networks
374 -- 389Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. Adaptive link-state routing and intrusion detection in wireless mesh networks
390 -- 396Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong. Physical layer assisted authentication for distributed ad hoc wireless sensor networks
397 -- 410Fatemeh Raji, Behrouz Tork Ladani. Anonymity and security for autonomous mobile agents
411 -- 421Jose M. Alcaraz Calero, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Towards an authorisation model for distributed systems based on the Semantic Web

Volume 4, Issue 3

111 -- 124W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou. m)
125 -- 136Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater. How to strongly link data and its medium: the paper case
137 -- 148Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene. Secure private fragile watermarking scheme with improved tampering localisation accuracy
149 -- 157Joan Daemen, Vincent Rijmen. Refinements of the ALRED construction and MAC security claims
158 -- 166A. U. Yargiçoglu, Hakki Gökhan Ilk. Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation
167 -- 184Xianfeng Zhao, Dengguo Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round

Volume 4, Issue 2

45 -- 48B. Wang. On the security of an identity-based proxy multi-signature scheme
49 -- 61Vesselin Velichkov, Vincent Rijmen, Bart Preneel. Algebraic cryptanalysis of a small-scale version of stream cipher Lex
62 -- 67Feng Hao, Peter Y. A. Ryan, Piotr Zielinski. Anonymous voting by two-round public discussion
68 -- 79Kun Wang, Meng Wu. Cooperative communications based on trust model for mobile ad hoc networks
80 -- 92Yoones Asgharzadeh Sekhavat, Mohammad Fathian. Mining frequent itemsets in the presence of malicious participants
93 -- 103Mitra Fatemi, Somayeh Salimi, Ahmad Salahi. Anonymous roaming in universal mobile telecommunication system mobile networks
104 -- 110Wenqiang Wang, Shaozhen Chen. Attribute-based ring signature scheme with constant-size signature

Volume 4, Issue 1

1 -- 7Mohammad Hassan Shirali-Shahreza, Sajad Shirali-Shahreza. Real-time and MPEG-1 layer III compression resistant steganography in speech
8 -- 14Haining Fan, Jia-Guang Sun, Ming Gu, Kwok-Yan Lam. Overlap-free Karatsuba-Ofman polynomial multiplication algorithms
15 -- 29Jing Liu, Laurent Vigneron. Design and verification of a non-repudiation protocol based on receiver-side smart card
30 -- 43Deniz Karakoyunlu, Frank Kagan Gürkaynak, Berk Sunar, Yusuf Leblebici. Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields