default search action
IET Information Security, Volume 12
Volume 12, Number 1, January 2018
- Kamaldeep, Manisha Malik, Maitreyee Dutta:
Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. 1-6 - Junjie Lv, Juling Rong:
Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model. 7-14 - Golnar Assadat Afzali, Shahriar Mohammadi:
Privacy preserving big data mining: association rule hiding using fuzzy logic approach. 15-24 - Hridoy Jyoti Mahanta, Ajoy Kumar Khan:
Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation. 25-33 - Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A provably secure code-based concurrent signature scheme. 34-41 - Shijun Xiang, Jiayong He:
Database authentication watermarking scheme in encrypted domain. 42-51 - Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh:
Attribute-based broadcast encryption scheme for lightweight devices. 52-59 - Hassan Seifi, Saeed Parsa:
Mining malicious behavioural patterns. 60-70 - Zheng Yang, Junyu Lai, Guoyuan Li:
Cryptanalysis of a generic one-round key exchange protocol with strong security. 71-78 - María Isabel González Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona:
Group key exchange protocols withstanding ephemeral-key reveals. 79-86 - Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. 87-93 - En Zhang, Jie Peng, Ming Li:
Outsourcing secret sharing scheme based on homomorphism encryption. 94-99 - Shaoquan Jiang, Jue Li, Yongjian Liao:
Efficient approximate message authentication scheme. 100-106
Volume 12, Number 2, March 2018
- Abdurrahman Pektas, Tankut Acarman:
Malware classification based on API calls and behaviour analysis. 107-117 - William J. Buchanan, Scott Helme, Alan Woodward:
Analysis of the adoption of security headers in HTTP. 118-126 - Shuaijianni Xu, Liang Feng Zhang:
Cryptanalysis of Morillo-Obrador polynomial delegation schemes. 127-132 - Jianxiong Shao, Yu Qin, Dengguo Feng:
Formal analysis of HMAC authorisation in the TPM2.0 specification. 133-140 - Shangping Wang, Xia Zhang, Yaling Zhang:
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. 141-149 - Girraj Kumar Verma, B. B. Singh:
Efficient identity-based blind message recovery signature scheme from pairings. 150-156 - Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. 157-164
Volume 12, Number 3, May 2018
- Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference. 165
- Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. 166-183 - Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Practical attribute-based signature schemes for circuits from bilinear map. 184-193 - Sebastian Meiser, Dominique Schröder:
Delegatable functional signatures. 194-206 - Angelo De Caro, Vincenzo Iovino, Adam O'Neill:
Receiver- and sender-deniable functional encryption. 207-216 - Samuel Neves, Mehdi Tibouchi:
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. 217-225 - Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng:
Mimic defense: a designed-in cybersecurity defense framework. 226-237 - Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. 238-245
Volume 12, Number 4, July 2018
- Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016). 247
- Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
Power of public-key function-private functional encryption. 248-256 - Eunkyung Kim, Mehdi Tibouchi:
FHE over the integers and modular arithmetic circuits. 257-264 - Yusuke Naito:
Sandwich construction for keyed sponges: independence between capacity and construction queries. 265-274 - Sergio de los Santos, José Torres:
Analysing HSTS and HPKP implementation in both browsers and servers. 275-284 - Emad S. Hassan, Amir Salah Elsafrawey, Moawad I. Dessouky:
Trade-off between self-healing and energy consumption in mobile unattended WSNs. 285-292 - Deepak Rewadkar, Dharmapal Dronacharya Doye:
Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET. 293-304 - Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang:
Protect white-box AES to resist table composition attacks. 305-313 - Sadegh Sadeghi, Nasour Bagheri:
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. 314-325 - Zhe Xia, Zheng Tong, Min Xiao, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. 326-331 - Menaga Devendran, Revathi Sathya:
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding. 332-340 - Özgü Can:
Personalised anonymity for microdata release. 341-347 - Meltem Kurt PehlIvanoõlu, Muharrem Tolga Sakalli, Sedat Akleylek, Nevcihan Duru, Vincent Rijmen:
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. 348-355 - Yongkang Tang, Shaoqing Li, Fan Zhang, Liang Fang:
Thermal maps based HT detection using spatial projection transformation. 356-361 - Yaojun Hao, Fuzhi Zhang:
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features. 362-374 - Yuan Ping, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du:
Deterministic lattice reduction on knapsacks with collision-free properties. 375-380 - ThienLuan Ho, Seong-Je Cho, Seungrohk Oh:
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. 381-388
Volume 12, Number 5, September 2018
- Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. 389-397 - Tzuo-Yau Fan, Her-Chang Chao:
User-friendly XOR-based visual secret sharing by random grid. 398-403 - Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García-Teodoro, José Camacho, Lorenzo Cavallaro:
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. 404-413 - Zhixiong Chen:
Linear complexity of Legendre-polynomial quotients. 414-418 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. 419-424 - Dan Wang, Bing Guo, Yan Shen:
Method for measuring the privacy level of pre-published dataset. 425-430 - Tao Chen, Michael Farcasin, Eric Chan-Tin:
Smartphone passcode prediction. 431-437 - Penglin Yang, Limin Tao, Haitao Wang:
RTTV: a dynamic CFI measurement tool based on TPM. 438-444 - Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei:
Sequential opening multi-jammers localisation in multi-hop wireless network. 445-454 - Emre Yüce, Ali Aydin Selçuk:
Server notaries: a complementary approach to the web PKI trust model. 455-461
Volume 12, Number 6, November 2018
- Frédéric Lafitte:
CryptoSAT: a tool for SAT-based cryptanalysis. 463-474 - Mingxing Hu, Qing Ye, Yongli Tang:
Efficient batch identity-based fully homomorphic encryption scheme in the standard model. 475-483 - Lin Jiao, Yongqiang Li, Yonglin Hao:
Guess-and-determine attacks on PANAMA-like stream ciphers. 484-497 - Jiayang Liu, Jingguo Bi:
Equivalent key attack against a public-key cryptosystem based on subset sum problem. 498-501 - Khundrakpam Johnson Singh, Khelchandra Thongam, Tanmay De:
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation. 502-512 - Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. 513-520 - Amor Gueddana, Vasudevan Lakshminarayanan:
Physical feasibility of QKD based on probabilistic quantum circuits. 521-526 - Jian Zou, Le Dong, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. 527-533 - Guangliang Xu, Wei Yang, Liusheng Huang:
Supervised learning framework for covert channel detection in LTE-A. 534-542 - Mohammad Taherifard, Ahmad Patooghy, Mahdi Fazeli:
Vulnerability modelling of crypto-chips against scan-based attacks. 543-550 - Md. Mokammel Haque, Josef Pieprzyk:
Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm. 551-557 - Mina Sadat Khazaei, Hossein Homaei, Hamid Reza Shahriari:
OPEXA: analyser assistant for detecting over-privileged extensions. 558-565
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.