![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
IET Information Security, Volume 4
Volume 4, Number 1, 2010
- Mohammad Hassan Shirali-Shahreza
, Sajad Shirali-Shahreza:
Real-time and MPEG-1 layer III compression resistant steganography in speech. 1-7 - Haining Fan, Jia-Guang Sun, Ming Gu, Kwok-Yan Lam:
Overlap-free Karatsuba-Ofman polynomial multiplication algorithms. 8-14 - Jing Liu, Laurent Vigneron:
Design and verification of a non-repudiation protocol based on receiver-side smart card. 15-29 - Deniz Karakoyunlu, Frank Kagan Gürkaynak, Berk Sunar, Yusuf Leblebici:
Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields. 30-43
Volume 4, Number 2, 2010
- Bin Wang:
On the security of an identity-based proxy multi-signature scheme. 45-48 - Vesselin Velichkov, Vincent Rijmen
, Bart Preneel
:
Algebraic cryptanalysis of a small-scale version of stream cipher Lex. 49-61 - Feng Hao
, Peter Y. A. Ryan
, Piotr Zielinski
:
Anonymous voting by two-round public discussion. 62-67 - Kun Wang, Meng Wu:
Cooperative communications based on trust model for mobile ad hoc networks. 68-79 - Yoones Asgharzadeh Sekhavat
, Mohammad Fathian:
Mining frequent itemsets in the presence of malicious participants. 80-92 - Mitra Fatemi, Somayeh Salimi, Ahmad Salahi:
Anonymous roaming in universal mobile telecommunication system mobile networks. 93-103 - Wenqiang Wang, Shaozhen Chen:
Attribute-based ring signature scheme with constant-size signature. 104-110
Volume 4, Number 3, 2010
- Wen-Tzeng Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou:
Concurrent error detection and correction in a polynomial basis multiplier over GF(2m). 111-124 - Philippe Bulens, François-Xavier Standaert
, Jean-Jacques Quisquater:
How to strongly link data and its medium: the paper case. 125-136 - Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene:
Secure private fragile watermarking scheme with improved tampering localisation accuracy. 137-148 - Joan Daemen, Vincent Rijmen
:
Refinements of the ALRED construction and MAC security claims. 149-157 - A. Utku Yargiçoglu, Hakki Gökhan Ilk
:
Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation. 158-166 - Xianfeng Zhao
, Dengguo Feng:
Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round. 167-184
Volume 4, Number 4, 2010
- Habib F. Rashvand, Khaled Salah
, José M. Alcaraz Calero
, Lein Harn:
Distributed security for multi-agent systems - review and applications. 188-201 - Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger:
Unconditionally secure social secret sharing scheme. 202-211 - Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang:
Trust-based on-demand multipath routing in mobile ad hoc networks. 212-232 - Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee:
Covert channel resistant information leakage protection using a multi-agent architecture. 233-247 - Chih-Ta Yen, Tzong-Chen Wu, Ming-Huang Guo, Chuan-Kai Yang, Han-Chieh Chao:
Digital product transaction mechanism for electronic auction environment. 248-257 - Pitipatana Sakarindr, Nirwan Ansari
:
Survey of security services on group communications. 258-272 - Christian Damsgaard Jensen
:
Supporting multi-agent reputation calculation in the Wikipedia Recommender System. 273-282 - Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta:
Integrated security analysis framework for an enterprise network - a formal approach. 283-300 - Morteza Amini
, Rasool Jalili:
Multi-level authorisation model and framework for distributed semantic-aware environments. 301-321 - Santosh Chandrasekhar, Saikat Chakrabarti, Mukesh Singhal, Kenneth L. Calvert:
Efficient proxy signatures based on trapdoor hash functions. 322-332 - Zubair A. Baig
, Khaled Salah
:
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks. 333-343 - Meng Yu, Wanyu Zang, Peng Liu:
Recovery of data integrity under multi-tier architectures. 344-351 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao:
Cluster-based secure communication mechanism in wireless ad hoc networks. 352-360 - Yi-Ying Zhang, Han-Chieh Chao, Min Chen, Lei Shu
, Chulhyun Park, Myong-Soon Park:
Outlier detection and countermeasure for hierarchical wireless sensor networks. 361-373 - Sudip Misra, P. Venkata Krishna
, Kiran Isaac Abraham:
Adaptive link-state routing and intrusion detection in wireless mesh networks. 374-389 - Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong:
Physical layer assisted authentication for distributed ad hoc wireless sensor networks. 390-396 - Fatemeh Raji
, Behrouz Tork Ladani
:
Anonymity and security for autonomous mobile agents. 397-410 - José M. Alcaraz Calero
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Towards an authorisation model for distributed systems based on the Semantic Web. 411-421
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.