International Journal of Applied Cryptography (IJACT)

International Journal of Applied Cryptography

2010 Vol.2 No.1

Special Issue on Information Security Practice and Experience

Guest Editors: Feng Bao and Guilin Wang

Preface

Pages Title and author(s)
3-12Achieving high security and efficiency in RFID-tagged supply chains
Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao
DOI: 10.1504/IJACT.2010.033794
13-22Designing attacks on SIP call set-up
Anders Moen Hagalisletto, Lars Strand
DOI: 10.1504/IJACT.2010.033795
23-34Defending against the pirate evolution attack
Hongxia Jin, Jeffrey Lotspiech, Serdar Pehlivanoglu
DOI: 10.1504/IJACT.2010.033796
35-45Strongly unforgeable ID-based signatures without random oracles
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
DOI: 10.1504/IJACT.2010.033797
46-59A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi
DOI: 10.1504/IJACT.2010.033798
60-67Some results on cryptanalysis of SMS4 block cipher
Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng
DOI: 10.1504/IJACT.2010.033799
68-81TWISTERπ – a framework for secure and fast hash functions
Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
DOI: 10.1504/IJACT.2010.033800