By Topic

IET Information Security

Issue 4 • December 2013

Filter Results

Displaying Results 1 - 12 of 12
  • Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map

    Publication Year: 2013, Page(s):265 - 270
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (735 KB)

    In this study, a novel scheme of advanced encryption standard (AES) is proposed. Its independent round key is generated by the two-dimensional (2D) Hénon map and the 2D Chebyshev map. The goal is to improve the low security and conquer the defect of the traditional AES algorithm. Then, the improved algorithm is used to encrypt colour image, and the result shows that the encryption algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New certificateless public key encryption scheme without pairing

    Publication Year: 2013, Page(s):271 - 276
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (139 KB)

    To satisfy the requirement of practical applications, many certificateless encryption schemes (CLE) without pairing have been proposed. Recently, Lai et al. proposed a CLE scheme without pairing and demonstrated that their scheme is provably secure in the random oracle model. The analysis shows that their scheme has better performance than the related schemes. However, Lai et al.'s scheme is not a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link quality-based cache replacement technique in mobile ad hoc network

    Publication Year: 2013, Page(s):277 - 282
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (411 KB)

    In mobile ad hoc network (MANET) routing protocols such as dynamic source routing, each node consist of route cache, in which routes to multiple destinations are indexed orderly. Since, route cache is capable of storing many routes it should be maintained periodically to its consistency and reliability. In this study, the authors put forward a link quality-based cache replacement technique ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JITSafe: a framework against Just-in-time spraying attacks

    Publication Year: 2013, Page(s):283 - 292
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (360 KB)

    A new code-reuse attack, named Just-in-time (JIT) spraying attack, leverages the predictable generated JIT compiled code to launch an attack. It can circumvent the defenses such as data execution prevention and address space layout randomisation built-in in the modern operation system, which were thought the insurmountable barrier so that the attackers cannot construct the traditional code injecti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chosen-plaintext linear attacks on Serpent

    Publication Year: 2013, Page(s):293 - 299
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (244 KB)

    In this study, the authors consider chosen-plaintext variants of the linear attack on reduced round Serpent. By reasonably fixing parts of the plaintexts of 10-round Serpent the number of texts required in a linear attack with single approximation can be significantly reduced by a factor of 222. The authors also give the best data complexity on 10-round Serpent so far, which is 280... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable fragile watermarking for image authentication

    Publication Year: 2013, Page(s):300 - 311
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (548 KB)

    Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the image.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polynomial differential-based strong (n, t, n)-verifiable secret sharing

    Publication Year: 2013, Page(s):312 - 317
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (121 KB)

    Basic secret sharing schemes assume that the dealer who divides the secret and distributes shares to participants is a mutually trusted party. The basic idea of free dealer secret sharing (SS) is that each participants acts as a dealer to choose the secret (sub secrets) and generate shares for other participants and then the master secret will be combine of these subs secrets. The t-consist... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive distributed certificate management scheme for space information network

    Publication Year: 2013, Page(s):318 - 326
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (542 KB)

    The security vulnerability of space information network is stimulating interest in developing security mechanisms study of heterogeneous network. However, it is noted that neither the single certificate authority (CA) nor the distributed CA can meet the security requirements for this type of network. In this study, the authors propose an adaptive distributed certificate management scheme in which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware acceleration of regular expression repetitions in deep packet inspection

    Publication Year: 2013, Page(s):327 - 335
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (504 KB)

    Network Intrusion Detection Systems (NIDS) make extensive use of regular expressions (regexes) as attack signatures. Such expressions can be handled in hardware using a bit-parallel (BP) architecture based on the Glushkov non-deterministic finite automata (NFA). However, many expressions contain constrained {min, max} repetitions which first need to be unrolled so that they can be handled by the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of data aggregation techniques using soft computing in wireless sensor networks

    Publication Year: 2013, Page(s):336 - 342
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management

    Publication Year: 2013, Page(s):343 - 348
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (135 KB)

    In a group-based trust management scheme, peers are partitioned into groups based on chosen characteristics, such as location and interest. The super peer (SP), who is responsible for the storage and distribution of reputation value, has an important role in group-based trust management. Thus, if the SP is a disguised or malicious peer, serious security problems could occur. To solve these securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systemic threats to hypervisor non-control data

    Publication Year: 2013, Page(s):349 - 354
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (223 KB)

    Hypervisors are becoming a widespread virtualisation layer in current computer systems. Recent successful attacks against hypervisors indicate that they face the similar integrity threats as traditional operating systems. Current approaches that secure hypervisors mainly focus on code or control-data integrity, without paying attention to non-control data integrity. In this study the authors const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org