Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887
banner image
image of Volume 6, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 6, Issue 3, September 2012


Volume 6, Issue 3

September 2012

Show / Hide details
    • Fair offline digital content transaction system
      Regression-based trust model for mobile ad hoc networks
      Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
      SACK2: effective SYN flood detection against skillful spoofs
      Fault-tolerant Gaussian normal basis multiplier over GF(2m)
      Design and implementation of an embedded intrusion detection system for wireless applications
      Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers
      Simultaneously generating multiple keys in a four-terminal network
      Agent-based honeynet framework for protecting servers in campus networks
      HB entity authentication for low-cost pervasive devices
      Long-term preservation of digital signatures for multiple groups of related documents
      Cryptanalysis of reduced versions of the Camellia block cipher

Most viewed content for this Journal

Article
content/journals/iet-ifs
Journal
5
Loading

Most cited content for this Journal

This is a required field
Please enter a valid email address