
International Journal of Applied Cryptography
2010 Vol.2 No.1
Special Issue on Information Security Practice and Experience
Guest Editors: Feng Bao and Guilin Wang
Pages | Title and author(s) |
3-12 | Achieving high security and efficiency in RFID-tagged supply chainsShaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao DOI: 10.1504/IJACT.2010.033794 |
13-22 | Designing attacks on SIP call set-upAnders Moen Hagalisletto, Lars Strand DOI: 10.1504/IJACT.2010.033795 |
23-34 | Defending against the pirate evolution attackHongxia Jin, Jeffrey Lotspiech, Serdar Pehlivanoglu DOI: 10.1504/IJACT.2010.033796 |
35-45 | Strongly unforgeable ID-based signatures without random oraclesChifumi Sato, Takeshi Okamoto, Eiji Okamoto DOI: 10.1504/IJACT.2010.033797 |
46-59 | A ciphertext-policy attribute-based encryption scheme with constant ciphertext lengthKeita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi DOI: 10.1504/IJACT.2010.033798 |
60-67 | Some results on cryptanalysis of SMS4 block cipherWentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng DOI: 10.1504/IJACT.2010.033799 |
68-81 | TWISTERπ – a framework for secure and fast hash functionsEwan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks DOI: 10.1504/IJACT.2010.033800 |