Journal: IET Information Security

Volume 6, Issue 4

239 -- 248Y. Yang, J. Gu, C. Lv, Q. Jiang, W. Ma. Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems
249 -- 257Kun Peng. Critical survey of existing publicly verifiable secret sharing schemes
258 -- 263Haibo Tian. Deniable message transmission authenticator based on weak signature schemes
264 -- 270P. Bhattacharya, S. K. Ghosh. Analytical framework for measuring network security using exploit dependency graph
271 -- 280Mahdi R. Alaghband, Mohammad Reza Aref. Dynamic and secure key management model for hierarchical heterogeneous sensor networks
281 -- 290Huaqun Wang, Bo Qin. Improved one-to-many authentication scheme for access control in pay-TV systems
291 -- 298Yung-Wei Kao, Xin Zhang 0003, Ahren Studer, Adrian Perrig. Mobile encryption for laptop data protection (MELP)
299 -- 309Xiaotian Wu, Wei Sun. Visual secret sharing for general access structures by random grids
310 -- 317Che Wun Chiou, Hung Wei Chang, Wen-Yew Liang, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh. m)
318 -- 323Che Wun Chiou, Tai-Pao Chuang, Shun-Shii Lin, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh. m) with odd type t
324 -- 328Jenq-Haur Wang, Hung Wei Chang, Che Wun Chiou, Wen-Yew Liang. m)
329 -- 336Martin Ă…gren, Martin Hell, Thomas Johansson. On hardware-oriented message authentication

Volume 6, Issue 3

123 -- 130Chin-Ling Chen, Jyun-Jie Liao. Fair offline digital content transaction system
131 -- 140Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao. Regression-based trust model for mobile ad hoc networks
141 -- 148Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar. Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
149 -- 156Changhua Sun, Chengchen Hu, Bin Liu 0001. 2: effective SYN flood detection against skillful spoofs
157 -- 170Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin, Chiou-Yng Lee. m)
171 -- 182Qutaiba Ibrahim Ali, S. Iazim. Design and implementation of an embedded intrusion detection system for wireless applications
183 -- 189Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee Cheon Chui. Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers
190 -- 201Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref. Simultaneously generating multiple keys in a four-terminal network
202 -- 211Iksu Kim, MyungHo Kim. Agent-based honeynet framework for protecting servers in campus networks
212 -- 218Zhijun Li, Guang Gong. C entity authentication for low-cost pervasive devices
219 -- 227Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas. Long-term preservation of digital signatures for multiple groups of related documents
228 -- 238Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim. Cryptanalysis of reduced versions of the Camellia block cipher

Volume 6, Issue 2

47 -- 54Aijun Ge, Chuangui Ma Ma, Zhenfeng Zhang. Attribute-based signature scheme with constant size signature in the standard model
55 -- 64Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. Internal state recovery of grain-v1 employing normality order of the filter function
65 -- 70Qi Xie. Provably secure convertible multi-authenticated encryption scheme
71 -- 76Iksu Kim. Keypad against brute force attacks on smartphones
77 -- 83Ningrinla Marchang, Raja Datta. Light-weight trust-based routing protocol for mobile ad hoc networks
84 -- 92Yao-Hsin Chou, Chi-Yuan Chen, Rui-Kai Fan, Han-Chieh Chao, Fang-Jhu Lin. Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping
93 -- 101Jasone Astorga, Eduardo Jacob, Maider Huarte, Marivi Higuero. 1: end-to-end authorisation support for resource-deprived environments
102 -- 110Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang 0003. Improved certificateless signature scheme provably secure in the standard model
111 -- 121An Feng, Michael Knieser, Maher E. Rizkalla, Brian King, Paul Salama, Francis Bowen. Embedded system for sensor communication and security

Volume 6, Issue 1

1 -- 5Kun Peng. Attack against a batch zero-knowledge proof system
6 -- 13G. Zheng, H.-T. Ma, C. Cheng, Y.-C. Tu. Design and logical analysis on the access authentication scheme for satellite mobile communication networks
14 -- 19Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam. Obtaining more Karatsuba-like formulae over the binary field
20 -- 27Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme
28 -- 40Kahraman D. Akdemir, Deniz Karakoyunlu, Berk Sunar. Non-linear error detection for elliptic curve cryptosystems
41 -- 46Qichun Wang, Thoinas Johansson, Haibin Kan. Some results on fast algebraic attacks and higher-order non-linearities