Journal: IET Information Security

Volume 7, Issue 4

265 -- 270Jianhua Li, Hui Liu. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
271 -- 276Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li. New certificateless public key encryption scheme without pairing
277 -- 282Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa. Link quality-based cache replacement technique in mobile ad hoc network
283 -- 292Ping Chen, Rui Wu, Bing Mao. JITSafe: a framework against Just-in-time spraying attacks
293 -- 299Jialin Huang, Xuejia Lai. Chosen-plaintext linear attacks on Serpent
300 -- 311Angela Piper, Reihaneh Safavi-Naini. Scalable fragile watermarking for image authentication
312 -- 317Qassim Al Mahmoud. Polynomial differential-based strong (n, t, n)-verifiable secret sharing
318 -- 326Fang Ren, Jiulun Fan. An adaptive distributed certificate management scheme for space information network
327 -- 335Brendan Cronin, Xiaojun Wang. Hardware acceleration of regular expression repetitions in deep packet inspection
343 -- 348Dong Jiao, MingChu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui. Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management
349 -- 354Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu. Systemic threats to hypervisor non-control data

Volume 7, Issue 3

165 -- 171Sedat Akleylek, Murat Cenk, Ferruh Ă–zbudak. On the generalisation of special moduli for faster interleaved montgomery modular multiplication
172 -- 180Jung-San Lee, Wei-Chiang Kao, Bo Li. Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness
181 -- 188Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang. Newmultivariate hash function quadratic polynomials multiplying linear polynomials
189 -- 194Hung-Wen Yang, Chou Chen Yang, Woei Lin. Enhanced digital rights management authentication scheme based on smart card
195 -- 202Yoon Ho Choi, Seung-Woo Seo. BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching
203 -- 211Muthumanickam Gunasekaran, Kandhasamy Premalatha. TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks
212 -- 220Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce. Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes
221 -- 229Dimitrios S. Karas, George K. Karagiannidis, Robert Schober. Channel level crossing-based security for communications over fading channels
230 -- 238Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri. Superpoly algebraic normal form monomial test on Trivium
239 -- 246Tsu-Yang Wu, Yuh-Min Tseng. Publicly verifiable multi-secret sharing scheme from bilinear pairings
247 -- 252Hsiu-Lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei Kuan Shih. Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data
253 -- 263Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu. Strong non-repudiation based on certificateless short signatures

Volume 7, Issue 2

0 -- 0Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues. IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks
0 -- 0Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan. uCloud: a user-centric key management scheme for cloud data protection
0 -- 0Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang. Fair (t, n) threshold secret sharing scheme
0 -- 0Salman Niksefat, Babak Sadeghiyan, Payman Mohassel. Oblivious decision program evaluation
0 -- 0Khusvinder Gill, Shuang-Hua Yang, Wan-liang Wang. Secure remote access to home automation networks
0 -- 0Xixiang Lv, Hui Li. Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
0 -- 0Lo'ai Ali Tawalbeh, Moad Mowafi, Walid Aljoby. Use of elliptic curve cryptography for multimedia encryption
0 -- 0Fen Miao, Shu-Di Bao, Ye Li. Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security
0 -- 0Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall. Antivirus performance characterisation: system-wide view
0 -- 0Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu. m) using Hankel matrix and Karatsuba algorithm
0 -- 0Yongzhuang Wei, Enes Pasalic. On the approximation of S-boxes via Maiorana-McFarland functions
0 -- 0Debiao He, Baojun Huang, Jianhua Chen. New certificateless short signature scheme

Volume 7, Issue 1

3 -- 10Chun-Ta Li. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
11 -- 21Kun Peng. Efficient proof of bid validity with untrusted verifier in homomorphic e-auction
22 -- 29Yueming Deng, Guojun Wang, Jiannong Cao, Xin Xiao. Practical secure and fast handoff framework for pervasive Wi-Fi access
30 -- 38Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. William Roscoe. Human interactive secure key and identity exchange protocols in body sensor networks
39 -- 50Xiaoyong Li, Junping Du. Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing
51 -- 59Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi. CloudAC: a cloud-oriented multilayer access control system for logic virtual domain