banner image
image of Volume 4, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 4, Issue 3, September 2010

Volume 4, Issue 3

September 2010

Show / Hide details
    • Concurrent error detection and correction in a polynomial basis multiplier over GF(2m)
      How to strongly link data and its medium: the paper case
      Secure private fragile watermarking scheme with improved tampering localisation accuracy
      Refinements of the ALRED construction and MAC security claims
      Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation
      Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address