


default search action
IET Information Security, Volume 1
Volume 1, Number 1, 2007
- Tim Good

, Mohammed Benaissa:
Pipelined AES on FPGA with support for feedback modes (in a multi-channel environment). 1-10 - Joan Daemen, Vincent Rijmen

:
Plateau characteristics. 11-17 - Byungchun Chung, Hong Gil Kim, Hyunsoo Yoon:

Improved base-φ expansion method for Koblitz curves over optimal extension fields. 19-26 - Joon S. Park, Gaeil An, Deepak Chandra:

Trusted P2P computing environments with role-based access control. 27-35 - Jin Cong, Zhiguo Qu, Zhongmei Zhang, Yan Jiang:

Web dual watermarking technology using an XML document. 37-42 - Tzonelih Hwang, Kuo-Chang Lee:

EPR quantum key distribution protocols with potential 100% qubit efficiency. 43-45
Volume 1, Number 2, 2007
- Martin Hell

, Thomas Johansson
:
Cryptanalysis of Achterbahn-128/80. 47-52 - Liam Keliher, Jiayuan Sui:

Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard. 53-57 - David Naccache:

Secure and practical identity-based encryption. 59-64 - Xinxin Fan, Thomas J. Wollinger, Guang Gong:

Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields. 65-81 - Marcel Fernandez, Miguel Soriano

, Josep Cotrina:
Tracing illegal redistribution using errors-anderasures and side information decoding algorithms. 83-90 - ShaoWei Weng, Youping Zhao, Jeng-Shyang Pan:

Reversible watermarking resistant to cropping attack. 91-95
Volume 1, Number 3, 2007
- Li Zhang, Weiwei Xiao, Zhen Ji:

Local affine transform invariant image watermarking by Krawtchouk moment invariants. 97-105 - Marc Joye, Pascal Manet, Jean-Baptiste Rigaud

:
Strengthening hardware AES implementations against fault attacks. 106-110 - Atefeh Mashatan

, Douglas R. Stinson:
Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions. 111-118 - Peter Mell, Karen Scarfone

:
Improving the Common Vulnerability Scoring System. 119-127 - Marco Bucci, Raimondo Luzzi, Francesco Menichelli, Renato Menicocci, Mauro Olivieri

, Alessandro Trifiletti:
Testing power-analysis attack susceptibility in register-transfer level designs. 128-133 - C. M. Lo, Tzonelih Hwang, Chuan-Ming Li:

Revocation-free public-key encryption based on security-mediated public-key infrastructure. 134-141
Volume 1, Number 4, 2007
- Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo

:
Comparing and debugging firewall rule tables. 143-151 - Chunxiao Chigan, Leiyuan Li, Yinghua Ye:

Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks. 152-162 - O. O. Obi, Falah H. Ali, Elias Stipidis:

Explicit expression for decryption in a generalisation of the paillier scheme. 163-166 - Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan:

Mobile ip registration in certificateless public key infrastructure. 167-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














