Journal: IET Information Security

Volume 5, Issue 4

181 -- 190Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks
191 -- 198Mostafa E. Saleh, A. Baith Mohamed, A. Abdel Nabi. Eigenviruses for metamorphic virus recognition
199 -- 206Aleksandar Kircanski, Amr M. Youssef. On the sliding property of SNOW 3 G and SNOW 2.0
207 -- 219Alexandra Boldyreva, Virendra Kumar. Provable-security analysis of authenticated encryption in Kerberos
220 -- 227Igor Santos, Felix Brezo, Borja Sanz, Carlos Laorden, Pablo Garcia Bringas. Using opcode sequences in single-class learning to detect unknown malware
228 -- 236Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala. Perfect involutory diffusion layers based on invertibility of some linear functions

Volume 5, Issue 3

129 -- 134Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba. Impossible differential cryptanalysis of reduced-round Camellia-256
135 -- 144Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera. Approach to security assessment of critical infrastructures' information systems
145 -- 151Ashok Kumar Das. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
152 -- 162W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, S. Y. Tan. m)
163 -- 169Luis Javier García-Villalba, Julián García Matesanz, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco. Secure extension to the optimised link state routing protocol
170 -- 180Xinchao Li, Ju Liu, Jiande Sun, Xiaohui Yang, Wei Liu. Step-projection-based spread transform dither modulation

Volume 5, Issue 2

81 -- 92Pei-Yu Lin, Chin-Chen Chang. Cheating resistance and reversibility-oriented secret sharing mechanism
93 -- 99Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun. Balanced rotation symmetric boolean functions with maximum algebraic immunity
100 -- 110Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert. One for all - all for one: unifying standard differential power analysis attacks
111 -- 120Ruilin Li, Bing Sun, Chao Li. Impossible differential cryptanalysis of SPN ciphers
121 -- 128Feng Liu, Chuan-Kun Wu. Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners

Volume 5, Issue 1

1 -- 9Saad M. Saad. Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification
10 -- 18Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy
19 -- 25Ning Chen, He-D. Xiao, Wanggen Wan. Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients
26 -- 32Yongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip. Steganalysis of compressed speech to detect covert voice over Internet protocol channels
33 -- 42Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin. Self-checking alternating logic bit-parallel gaussian normal basis multiplier with type-t
43 -- 50Te-Cheng Hsu, Wen-Shyong Hsieh, John Y. Chiang, Tung-Shih Su. New watermark-removal method based on Eigen-image energy
51 -- 59Feng Liu, Chuan-Kun Wu, Xi Jun Lin. Cheating immune visual cryptography scheme
60 -- 68Mariano López, John Daugman, Enrique Cantó. Hardware-software co-design of an iris recognition algorithm
69 -- 79Yao-Hsin Chou, Chi-Yuan Chen, Han-Chieh Chao, Jong Hyuk Park, Rui-Kai Fan. Quantum entanglement and non-locality based secure computation for future communication