By Topic

IET Information Security

Issue 3 • Date Sept. 2012

Filter Results

Displaying Results 1 - 12 of 12
  • Fair offline digital content transaction system

    Publication Year: 2012, Page(s):123 - 130
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (365 KB)

    More and more customers are purchasing digital content through the Internet because it is both popular and convenient. However, there are lots of pirated editions of digital products and they have become more available and easier to obtain. Hence, proving who the legal owner of digital content has become an important issue. In this study, the authors want to preserve customer ownership; they propo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression-based trust model for mobile ad hoc networks

    Publication Year: 2012, Page(s):131 - 140
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (541 KB)

    The focus of this study is to propose a generalised trust-model over routing protocols in mobile ad hoc networks (MANETs). It is observed that the presence of malicious nodes is a critical factor affecting the network performance in an ad hoc network. The novelty in the approach is that the notion of trust can be easily incorporated into any routing protocol in MANETs. The vector aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls

    Publication Year: 2012, Page(s):141 - 148
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (552 KB)

    Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a VoIP call have been investigated by using the E mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SACK2: effective SYN flood detection against skillful spoofs

    Publication Year: 2012, Page(s):149 - 156
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (367 KB)

    SYN flood attacks still dominate distributed denial of service attacks. It is a great challenge to accurately detect the SYN flood attacks which utilise skillful spoofs to evade traditional detection methods. An intelligent attacker would evade the public detection methods by suitably spoofing the attack to appear benign. Keeping per-flow or per-connection state could eliminate such a spoofing, bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant Gaussian normal basis multiplier over GF(2m)

    Publication Year: 2012, Page(s):157 - 170
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (878 KB)

    Fault-tolerant design of a finite field multiplier is an efficient method for resisting fault-based cryptanalysis in Elliptic curve cryptosystems. A novel fault-tolerant bit-parallel Gaussian normal basis (GNB) multiplier with type-t over GF(2m), which can tolerate multiple module failures at one time, is presented. No hardware modification in the proposed GNB multiplier is required to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an embedded intrusion detection system for wireless applications

    Publication Year: 2012, Page(s):171 - 182
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1173 KB)

    The exponential growth in wireless network faults, vulnerabilities and attacks makes the wireless local area network (WLAN) security management a challenging research area. In this study, a new embedded wireless intrusion detection system (WIDS) is designed and implemented in order to protect a multi-services wireless network. The proposed WIDS must be in small size in order to be integrated in di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers

    Publication Year: 2012, Page(s):183 - 189
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (351 KB)

    It is well known that in order to build linear scramblers and stream ciphers that are robust against correlation-based reconstruction, primitive polynomials which do not have sparse multiples of moderate degrees must be used. In this paper, the existence and density of such `good primitive polynomials` are studied. Two theoretical lower bounds on the degree d of the primitive polynomial are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simultaneously generating multiple keys in a four-terminal network

    Publication Year: 2012, Page(s):190 - 201
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (336 KB)

    A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based honeynet framework for protecting servers in campus networks

    Publication Year: 2012, Page(s):202 - 211
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (972 KB)

    Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) that use signatures cannot protect servers from new types of internet worms. Therefore it is important to collect information about new attacks because the detection rules employed by IDSs and IPSs are formulated using this information. Honeypots are valuable security resources that act as baits for attackers. They can moni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HBC entity authentication for low-cost pervasive devices

    Publication Year: 2012, Page(s):212 - 218
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (198 KB)

    The HB-like entity authentication protocols for low-cost pervasive devices have attracted a great deal of attention because of their simplicity, computational efficiency and solid security foundation on a well-studied hard problem-learning parity with noise. By far, the most efficient protocol is HB#, which is provably resistant to the GRS attack under the conjecture that it is secure i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Long-term preservation of digital signatures for multiple groups of related documents

    Publication Year: 2012, Page(s):219 - 227
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (490 KB)

    Increasing numbers of documents are currently being stored in electronic archives. These documents are often digitally signed to ensure non-repudiation. However, the term of validity of digital signatures is usually only 2 years, so the archive must extend their validity to the required storage period. The simplest solution to this problem is to use XAdES-A specification and process each signed do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of reduced versions of the Camellia block cipher

    Publication Year: 2012, Page(s):228 - 238
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (391 KB)

    The Camellia block cipher has a 128-bit block length, a user key 128, 192 or 256 bits long and a total of 18 rounds for a 128-bit key and 24 rounds for a 192 or 256-bit key. It is a Japanese CRYPTREC-recommended e-government cipher, a European new European schemes for signatures, integrity and encryption (NESSIE) selected cipher and an ISO international standard. In this study, the authors describ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org