Journal cover image

Browse issues

Vol. 3
Vol. 2
Vol. 1

International Journal of Applied Cryptography

2010 Vol. 2 No. 1

Special Issue on Information Security Practice and Experience

Guest Editors: Feng Bao and Guilin Wang


PagesTitle and authors
3-12Achieving high security and efficiency in RFID-tagged supply chains
Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao
DOI: 10.1504/IJACT.2010.033794

13-22Designing attacks on SIP call set-up
Anders Moen Hagalisletto, Lars Strand
DOI: 10.1504/IJACT.2010.033795

23-34Defending against the pirate evolution attack
Hongxia Jin, Jeffrey Lotspiech, Serdar Pehlivanoglu
DOI: 10.1504/IJACT.2010.033796

35-45Strongly unforgeable ID-based signatures without random oracles
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
DOI: 10.1504/IJACT.2010.033797

46-59A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi
DOI: 10.1504/IJACT.2010.033798

60-67Some results on cryptanalysis of SMS4 block cipher
Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng
DOI: 10.1504/IJACT.2010.033799

68-81TWISTERπ – a framework for secure and fast hash functions
Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
DOI: 10.1504/IJACT.2010.033800