default search action
IET Information Security, Volume 5
Volume 5, Number 1, 2011
- Saad M. Saad:
Application of fuzzy logic and genetic algorithm in biometric text-independent writer identification. 1-9 - Fangjun Huang, Weiqi Luo, Jiwu Huang:
Steganalysis of JPEG steganography with complementary embedding strategy. 10-18 - Ning Chen, He-D. Xiao, Wanggen Wan:
Audio hash function based on non-negative matrix factorisation of mel-frequency cepstral coefficients. 19-25 - Yongfeng Huang, Shanyu Tang, Chunlan Bao, Yau Jim Yip:
Steganalysis of compressed speech to detect covert voice over Internet protocol channels. 26-32 - Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin:
Self-checking alternating logic bit-parallel gaussian normal basis multiplier with type-t. 33-42 - Te-Cheng Hsu, Wen-Shyong Hsieh, John Y. Chiang, Tung-Shih Su:
New watermark-removal method based on Eigen-image energy. 43-50 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Cheating immune visual cryptography scheme. 51-59 - Mariano López, John Daugman, Enrique Cantó:
Hardware-software co-design of an iris recognition algorithm. 60-68 - Yao-Hsin Chou, Chi-Yuan Chen, Han-Chieh Chao, Jong Hyuk Park, Rui-Kai Fan:
Quantum entanglement and non-locality based secure computation for future communication. 69-79
Volume 5, Number 2, 2011
- Pei-Yu Lin, Chin-Chen Chang:
Cheating resistance and reversibility-oriented secret sharing mechanism. 81-92 - Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. 93-99 - Stefan Mangard, Elisabeth Oswald, François-Xavier Standaert:
One for all - all for one: unifying standard differential power analysis attacks. 100-110 - Ruilin Li, Bing Sun, Chao Li:
Impossible differential cryptanalysis of SPN ciphers. 111-120 - Feng Liu, Chuan Kun Wu:
Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. 121-128
Volume 5, Number 3, 2011
- Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba:
Impossible differential cryptanalysis of reduced-round Camellia-256. 129-134 - Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Approach to security assessment of critical infrastructures' information systems. 135-144 - Ashok Kumar Das:
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. 145-151 - Wen-Tzeng Huang, Chih-Hsiang Chang, Che Wun Chiou, Sun-Yen Tan:
Non-XOR approach for low-cost bit-parallel polynomial basis multiplier over GF(2m). 152-162 - Luis Javier García-Villalba, Julián García Matesanz, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco:
Secure extension to the optimised link state routing protocol. 163-169 - Xinchao Li, Ju Liu, Jiande Sun, Xiaohui Yang, Wei Liu:
Step-projection-based spread transform dither modulation. 170-180
Volume 5, Number 4, 2011
- Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. 181-190 - Mostafa E. Saleh, A. Baith Mohamed, A. Abdel Nabi:
Eigenviruses for metamorphic virus recognition. 191-198 - Aleksandar Kircanski, Amr M. Youssef:
On the sliding property of SNOW 3 G and SNOW 2.0. 199-206 - Alexandra Boldyreva, Virendra Kumar:
Provable-security analysis of authenticated encryption in Kerberos. 207-219 - Igor Santos, Felix Brezo, Borja Sanz, Carlos Laorden, Pablo García Bringas:
Using opcode sequences in single-class learning to detect unknown malware. 220-227 - Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala:
Perfect involutory diffusion layers based on invertibility of some linear functions. 228-236
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.