default search action
IET Information Security, Volume 1
Volume 1, Number 1, 2007
- Tim Good, Mohammed Benaissa:
Pipelined AES on FPGA with support for feedback modes (in a multi-channel environment). 1-10 - Joan Daemen, Vincent Rijmen:
Plateau characteristics. 11-17 - Byungchun Chung, Hong Gil Kim, Hyunsoo Yoon:
Improved base-φ expansion method for Koblitz curves over optimal extension fields. 19-26 - Joon S. Park, Gaeil An, Deepak Chandra:
Trusted P2P computing environments with role-based access control. 27-35 - Jin Cong, Zhiguo Qu, Zhongmei Zhang, Yan Jiang:
Web dual watermarking technology using an XML document. 37-42 - Tzonelih Hwang, Kuo-Chang Lee:
EPR quantum key distribution protocols with potential 100% qubit efficiency. 43-45
Volume 1, Number 2, 2007
- Martin Hell, Thomas Johansson:
Cryptanalysis of Achterbahn-128/80. 47-52 - Liam Keliher, Jiayuan Sui:
Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard. 53-57 - David Naccache:
Secure and practical identity-based encryption. 59-64 - Xinxin Fan, Thomas J. Wollinger, Guang Gong:
Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields. 65-81 - Marcel Fernandez, Miguel Soriano, Josep Cotrina:
Tracing illegal redistribution using errors-anderasures and side information decoding algorithms. 83-90 - ShaoWei Weng, Youping Zhao, Jeng-Shyang Pan:
Reversible watermarking resistant to cropping attack. 91-95
Volume 1, Number 3, 2007
- Li Zhang, Weiwei Xiao, Zhen Ji:
Local affine transform invariant image watermarking by Krawtchouk moment invariants. 97-105 - Marc Joye, Pascal Manet, Jean-Baptiste Rigaud:
Strengthening hardware AES implementations against fault attacks. 106-110 - Atefeh Mashatan, Douglas R. Stinson:
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions. 111-118 - Peter Mell, Karen Scarfone:
Improving the Common Vulnerability Scoring System. 119-127 - Marco Bucci, Raimondo Luzzi, Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti:
Testing power-analysis attack susceptibility in register-transfer level designs. 128-133 - C. M. Lo, Tzonelih Hwang, Chuan-Ming Li:
Revocation-free public-key encryption based on security-mediated public-key infrastructure. 134-141
Volume 1, Number 4, 2007
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo:
Comparing and debugging firewall rule tables. 143-151 - Chunxiao Chigan, Leiyuan Li, Yinghua Ye:
Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks. 152-162 - O. O. Obi, Falah H. Ali, Elias Stipidis:
Explicit expression for decryption in a generalisation of the paillier scheme. 163-166 - Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan:
Mobile ip registration in certificateless public key infrastructure. 167-173
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.