banner image
image of Volume 11, Issue 5
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 11, Issue 5, September 2017

Volume 11, Issue 5

September 2017

Show / Hide details
    • Multi-receiver authentication scheme with hierarchical structure
      All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers
      Dynamic authenticated data structures with access control for outsourcing data stream
      SignORKE: improving pairing-based one-round key exchange without random oracles
      A secure data backup scheme using multi-factor authentication
      Certificate-based signature scheme in the standard model
      Constructions of involutions with optimal minimum degree
      Results on significant anomalies of state values after key scheduling algorithm in RC4
      Revisiting impossible differentials of MARS-like structures
      New integral attacks on SIMON
      Computational SS and conversion protocols in both active and passive settings
      Migrating from RBAC to temporal RBAC

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address