- 2012
- Martin Ågren, Martin Hell, Thomas Johansson:
On hardware-oriented message authentication. IET Inf. Secur. 6(4): 329-336 (2012) - Kahraman D. Akdemir, Deniz Karakoyunlu, Berk Sunar:
Non-linear error detection for elliptic curve cryptosystems. IET Inf. Secur. 6(1): 28-40 (2012) - Mahdi R. Alaghband, Mohammad Reza Aref:
Dynamic and secure key management model for hierarchical heterogeneous sensor networks. IET Inf. Secur. 6(4): 271-280 (2012) - Qutaiba Ibrahim Ali, S. Iazim:
Design and implementation of an embedded intrusion detection system for wireless applications. IET Inf. Secur. 6(3): 171-182 (2012) - Jasone Astorga, Eduardo Jacob, Maider Huarte, Marivi Higuero:
Ladon1: end-to-end authorisation support for resource-deprived environments. IET Inf. Secur. 6(2): 93-101 (2012) - Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref:
Simultaneously generating multiple keys in a four-terminal network. IET Inf. Secur. 6(3): 190-201 (2012) - P. Bhattacharya, S. K. Ghosh:
Analytical framework for measuring network security using exploit dependency graph. IET Inf. Secur. 6(4): 264-270 (2012) - Chin-Ling Chen, Jyun-Jie Liao:
Fair offline digital content transaction system. IET Inf. Secur. 6(3): 123-130 (2012) - Che Wun Chiou, Hung Wei Chang, Wen-Yew Liang, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh:
Low-complexity Gaussian normal basis multiplier over GF(2m). IET Inf. Secur. 6(4): 310-317 (2012) - Che Wun Chiou, Tai-Pao Chuang, Shun-Shii Lin, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh:
Palindromic-like representation for Gaussian normal basis multiplier over GF(2m) with odd type t. IET Inf. Secur. 6(4): 318-323 (2012) - Yao-Hsin Chou, Chi-Yuan Chen, Rui-Kai Fan, Han-Chieh Chao, Fang-Jhu Lin:
Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping. IET Inf. Secur. 6(2): 84-92 (2012) - Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin, Chiou-Yng Lee:
Fault-tolerant Gaussian normal basis multiplier over GF(2m). IET Inf. Secur. 6(3): 157-170 (2012) - Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar:
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls. IET Inf. Secur. 6(3): 141-148 (2012) - Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam:
Obtaining more Karatsuba-like formulae over the binary field. IET Inf. Secur. 6(1): 14-19 (2012) - An Feng, Michael Knieser, Maher E. Rizkalla, Brian King, Paul Salama, Francis Bowen:
Embedded system for sensor communication and security. IET Inf. Secur. 6(2): 111-121 (2012) - Ai-Jun Ge, Chuangui Ma Ma, Zhenfeng Zhang:
Attribute-based signature scheme with constant size signature in the standard model. IET Inf. Secur. 6(2): 47-54 (2012) - Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas:
Long-term preservation of digital signatures for multiple groups of related documents. IET Inf. Secur. 6(3): 219-227 (2012) - Yung-Wei Kao, Xin Zhang, Ahren Studer, Adrian Perrig:
Mobile encryption for laptop data protection (MELP). IET Inf. Secur. 6(4): 291-298 (2012) - Iksu Kim:
Keypad against brute force attacks on smartphones. IET Inf. Secur. 6(2): 71-76 (2012) - Iksu Kim, Myungho Kim:
Agent-based honeynet framework for protecting servers in campus networks. IET Inf. Secur. 6(3): 202-211 (2012) - Zhijun Li, Guang Gong:
HBC entity authentication for low-cost pervasive devices. IET Inf. Secur. 6(3): 212-218 (2012) - Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee-Cheon Chui:
Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers. IET Inf. Secur. 6(3): 183-189 (2012) - Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim:
Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf. Secur. 6(3): 228-238 (2012) - Ningrinla Marchang, Raja Datta:
Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf. Secur. 6(2): 77-83 (2012) - Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - Kun Peng:
Attack against a batch zero-knowledge proof system. IET Inf. Secur. 6(1): 1-5 (2012) - Kun Peng:
Critical survey of existing publicly verifiable secret sharing schemes. IET Inf. Secur. 6(4): 249-257 (2012) - Changhua Sun, Chengchen Hu, Bin Liu:
SACK2: effective SYN flood detection against skillful spoofs. IET Inf. Secur. 6(3): 149-156 (2012) - Haibo Tian:
Deniable message transmission authenticator based on weak signature schemes. IET Inf. Secur. 6(4): 258-263 (2012) - Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao:
Regression-based trust model for mobile ad hoc networks. IET Inf. Secur. 6(3): 131-140 (2012)