banner image
image of Volume 4, Issue 2
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 4, Issue 2, June 2010

Volume 4, Issue 2

June 2010

Show / Hide details
    • On the security of an identity-based proxy multi-signature scheme
      Algebraic cryptanalysis of a small-scale version of stream cipher Lex
      Anonymous voting by two-round public discussion
      Cooperative communications based on trust model for mobile ad hoc networks
      Mining frequent itemsets in the presence of malicious participants
      Anonymous roaming in universal mobile telecommunication system mobile networks
      Attribute-based ring signature scheme with constant-size signature

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address