- Jenq-Haur Wang, Hung Wei Chang, Che Wun Chiou, Wen-Yew Liang:
Low-complexity design of bit-parallel dual-basis multiplier over GF(2m). IET Inf. Secur. 6(4): 324-328 (2012) - Qichun Wang, Thomas Johansson, Haibin Kan:
Some results on fast algebraic attacks and higher-order non-linearities. IET Inf. Secur. 6(1): 41-46 (2012) - Huaqun Wang, Bo Qin:
Improved one-to-many authentication scheme for access control in pay-TV systems. IET Inf. Secur. 6(4): 281-290 (2012) - Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin:
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf. Secur. 6(1): 20-27 (2012) - Xiaotian Wu, Wei Sun:
Visual secret sharing for general access structures by random grids. IET Inf. Secur. 6(4): 299-309 (2012) - Qi Xie:
Provably secure convertible multi-authenticated encryption scheme. IET Inf. Secur. 6(2): 65-70 (2012) - Y. Yang, J. Gu, C. Lv, Qi Jiang, W. Ma:
Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems. IET Inf. Secur. 6(4): 239-248 (2012) - Yong Yu, Yi Mu, Guilin Wang, Qi Xia, Bo Yang:
Improved certificateless signature scheme provably secure in the standard model. IET Inf. Secur. 6(2): 102-110 (2012) - Gang Zheng, Hengtai Ma, C. Cheng, Y.-C. Tu:
Design and logical analysis on the access authentication scheme for satellite mobile communication networks. IET Inf. Secur. 6(1): 6-13 (2012)