banner image
image of Volume 10, Issue 1
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 10, Issue 1, January 2016

Volume 10, Issue 1

January 2016

Show / Hide details
    • Logarithmic size ring signatures without random oracles
      Unified security model of authenticated key exchange with specific adversarial capabilities
      Random table and hash coding-based binary code obfuscation against stack trace analysis
      Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems
      Efficient ways of prime number generation for ring signatures
      Information fusion-based method for distributed domain name system cache poisoning attack detection and identification
      Robustness of text-based completely automated public turing test to tell computers and humans apart

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address