default search action
IET Information Security, Volume 8
Volume 8, Number 1, January 2014
- Lathies Bhasker:
Genetically derived secure cluster-based data aggregation in wireless sensor networks. 1-7 - Huixian Li, Liaojun Pang:
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme. 8-11 - Dejun Mu, Wei Hu, Baolei Mao, Bo Ma:
A bottom-up approach to verifiable embedded system information flow security. 12-17 - Zongqu Zhao, Junfeng Wang, Jinrong Bai:
Malware detection method based on the control-flow construct feature of software. 18-24 - Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams:
Analysis of Bayesian classification-based approaches for Android malware detection. 25-36 - Yan-Xiao Liu:
Efficient t-cheater identifiable (k, n) secret-sharing scheme for t ⩽ [((k - 2)/2)]. 37-41 - Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, David J. Parish:
Manual and Automatic assigned thresholds in multi-layer data fusion intrusion detection system for 802.11 attacks. 42-50
Volume 8, Number 2, March 2014
- Audun Jøsang:
Identity management and trusted interaction in internet and mobile computing. 67-79 - Zurina Mohd Hanapi, Mahamod Ismail:
Impact of blackhole and Sybil attacks on dynamic windows secured implicit geographic forwarding routing protocol. 80-87 - Hui Xia, Zhiping Jia, Edwin Hsing-Mean Sha:
Research of trust model based on fuzzy theory in mobile ad hoc networks. 88-103 - Jenq-Shiou Leu, WenBin Hsieh:
Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards. 104-113 - Huaqun Wang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer:
Identity-based remote data possession checking in public clouds. 114-121 - Jerzy Kaczmarek, Michal R. Wróbel:
Operating system security by integrity checking and recovery using write-protected storage. 122-131 - Ronald Petrlic, Christoph Sorge:
Establishing user trust in automated teller machine integrity. 132-139 - Hao Bai, Changzhen Hu, Xiao-chuan Jing, Ning Li, Xiaoyin Wang:
Approach for malware identification using dynamic behaviour and outcome triggering. 140-151
Volume 8, Number 3, May 2014
- Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey:
Intelligent rule-based phishing websites classification. 153-160 - Xin Wang, Chaowei Yuan:
Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism. 161-170 - Lein Harn:
Generalised cheater detection and identification. 171-178 - Pandi Vijayakumar, Sundan Bose, Arputharaj Kannan:
Chinese remainder theorem based centralised group key management for secure multicast communication. 179-187 - Abdulah Abdulah Zadeh, Howard M. Heys:
Simple power analysis applied to nonlinear feedback shift registers. 188-198 - Haojie Shen, Li Zhuo, Yingdi Zhao:
An efficient motion reference structure based selective encryption algorithm for H.264 videos. 199-206 - Hamid Mala:
Biclique-based cryptanalysis of the block cipher SQUARE. 207-212 - Xing-Yuan Wang, Sheng-Xian Gu:
New chaotic encryption algorithm based on chaotic sequence and plain text. 213-216
Volume 8, Number 4, July 2014
- Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu:
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. 217-223 - Mitra Fatemi, Reza Ghasemi, Taraneh Eghlidos, Mohammad Reza Aref:
Efficient multistage secret sharing scheme using bilinear map. 224-229 - Hongzhen Du, Qiaoyan Wen:
Security analysis of two certificateless short signature schemes. 230-233 - V. Rajamanickam, Duraisamy Veerappan:
Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks. 234-239 - Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. 240-249 - Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:
Dynamic rule and rule-field optimisation for improving firewall performance and security. 250-257
Volume 8, Number 5, September 2014
- Shao-zhen Chen, Tian-min Xu:
Biclique key recovery for ARIA-256. 259-264 - Jiao Du, Qiaoyan Wen, Jie Zhang, Shanqi Pang:
Constructions of resilient rotation symmetric boolean functions on given number of variables. 265-272 - Chaowen Guan, Jian Weng, Robert H. Deng, Min-Rong Chen, Dehua Zhou:
Unforgeability of an improved certificateless signature scheme in the standard model. 273-276 - Ø. Marøy, M. Gudmundsen, Lars Lydersen, Johannes Skaar:
Error estimation, error correction and verification in quantum key distribution. 277-282
Volume 8, Number 6, November 2014
- Dylan Clarke, Feng Hao:
Cryptanalysis of the dragonfly key exchange protocol. 283-289 - Yi Jiang, Wei Cheng, Xiaojiang Du:
Group-based key array authentication protocol in radio frequency identification systems. 290-296 - Guangpu Gao, Thomas W. Cusick, Wenfen Liu:
Families of rotation symmetric functions with useful cryptographic properties. 297-302 - Lein Harn:
Comments on 'fair (t, n) threshold secret sharing scheme'. 303-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.