


default search action
IET Information Security, Volume 12
Volume 12, Number 1, January 2018
- Kamaldeep, Manisha Malik

, Maitreyee Dutta
:
Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. 1-6 - Junjie Lv, Juling Rong:

Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model. 7-14 - Golnar Assadat Afzali, Shahriar Mohammadi:

Privacy preserving big data mining: association rule hiding using fuzzy logic approach. 15-24 - Hridoy Jyoti Mahanta, Ajoy Kumar Khan:

Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation. 25-33 - Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref:

A provably secure code-based concurrent signature scheme. 34-41 - Shijun Xiang, Jiayong He:

Database authentication watermarking scheme in encrypted domain. 42-51 - Sébastien Canard, Duong Hieu Phan

, Viet Cuong Trinh
:
Attribute-based broadcast encryption scheme for lightweight devices. 52-59 - Hassan Seifi, Saeed Parsa

:
Mining malicious behavioural patterns. 60-70 - Zheng Yang

, Junyu Lai, Guoyuan Li
:
Cryptanalysis of a generic one-round key exchange protocol with strong security. 71-78 - María Isabel González Vasco

, Angel L. Pérez del Pozo, Adriana Suárez Corona
:
Group key exchange protocols withstanding ephemeral-key reveals. 79-86 - Kai Zhang

, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. 87-93 - En Zhang, Jie Peng, Ming Li:

Outsourcing secret sharing scheme based on homomorphism encryption. 94-99 - Shaoquan Jiang, Jue Li, Yongjian Liao:

Efficient approximate message authentication scheme. 100-106
Volume 12, Number 2, March 2018
- Abdurrahman Pektas, Tankut Acarman

:
Malware classification based on API calls and behaviour analysis. 107-117 - William J. Buchanan

, Scott Helme, Alan Woodward
:
Analysis of the adoption of security headers in HTTP. 118-126 - Shuaijianni Xu, Liang Feng Zhang:

Cryptanalysis of Morillo-Obrador polynomial delegation schemes. 127-132 - Jianxiong Shao, Yu Qin, Dengguo Feng:

Formal analysis of HMAC authorisation in the TPM2.0 specification. 133-140 - Shangping Wang, Xia Zhang

, Yaling Zhang:
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. 141-149 - Girraj Kumar Verma

, B. B. Singh:
Efficient identity-based blind message recovery signature scheme from pairings. 150-156 - Xiaonan Wang, Zhengxiong Dou, Yi Mu:

CCN framework with privacy support. 157-164
Volume 12, Number 3, May 2018
- Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference. 165

- Nils Fleischhacker

, Johannes Krupp
, Giulio Malavolta
, Jonas Schneider, Dominique Schröder
, Mark Simkin:
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. 166-183 - Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:

Practical attribute-based signature schemes for circuits from bilinear map. 184-193 - Sebastian Meiser, Dominique Schröder

:
Delegatable functional signatures. 194-206 - Angelo De Caro, Vincenzo Iovino

, Adam O'Neill:
Receiver- and sender-deniable functional encryption. 207-216 - Samuel Neves

, Mehdi Tibouchi:
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. 217-225 - Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng:

Mimic defense: a designed-in cybersecurity defense framework. 226-237 - Nader Sohrabi Safa

, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. 238-245
Volume 12, Number 4, July 2018
- Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016). 247

- Vincenzo Iovino

, Qiang Tang
, Karol Zebrowski:
Power of public-key function-private functional encryption. 248-256 - Eunkyung Kim, Mehdi Tibouchi:

FHE over the integers and modular arithmetic circuits. 257-264 - Yusuke Naito:

Sandwich construction for keyed sponges: independence between capacity and construction queries. 265-274 - Sergio de los Santos, José Torres:

Analysing HSTS and HPKP implementation in both browsers and servers. 275-284 - Emad S. Hassan

, Amir Salah Elsafrawey
, Moawad I. Dessouky:
Trade-off between self-healing and energy consumption in mobile unattended WSNs. 285-292 - Deepak Rewadkar, Dharmapal Dronacharya Doye:

Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET. 293-304 - Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang:

Protect white-box AES to resist table composition attacks. 305-313 - Sadegh Sadeghi

, Nasour Bagheri
:
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. 314-325 - Zhe Xia, Zheng Tong, Min Xiao

, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. 326-331 - D. Menaga

, Revathi Sathya
:
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding. 332-340 - Özgü Can

:
Personalised anonymity for microdata release. 341-347 - Meltem Kurt PehlIvanoõlu

, Muharrem Tolga Sakalli, Sedat Akleylek
, Nevcihan Duru
, Vincent Rijmen
:
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. 348-355 - Yongkang Tang, Shaoqing Li, Fan Zhang, Liang Fang:

Thermal maps based HT detection using spatial projection transformation. 356-361 - Yaojun Hao, Fuzhi Zhang:

Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features. 362-374 - Yuan Ping

, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du
:
Deterministic lattice reduction on knapsacks with collision-free properties. 375-380 - ThienLuan Ho, Seong-Je Cho, Seungrohk Oh:

Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. 381-388
Volume 12, Number 5, September 2018
- Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:

Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. 389-397 - Tzuo-Yau Fan, Her-Chang Chao:

User-friendly XOR-based visual secret sharing by random grid. 398-403 - Guillermo Suarez-Tangil

, Santanu Kumar Dash
, Pedro García-Teodoro
, José Camacho
, Lorenzo Cavallaro
:
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. 404-413 - Zhixiong Chen:

Linear complexity of Legendre-polynomial quotients. 414-418 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:

Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. 419-424 - Dan Wang, Bing Guo, Yan Shen:

Method for measuring the privacy level of pre-published dataset. 425-430 - Tao Chen

, Michael Farcasin
, Eric Chan-Tin:
Smartphone passcode prediction. 431-437 - Penglin Yang, Limin Tao, Haitao Wang:

RTTV: a dynamic CFI measurement tool based on TPM. 438-444 - Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei:

Sequential opening multi-jammers localisation in multi-hop wireless network. 445-454 - Emre Yüce, Ali Aydin Selçuk

:
Server notaries: a complementary approach to the web PKI trust model. 455-461
Volume 12, Number 6, November 2018
- Frédéric Lafitte

:
CryptoSAT: a tool for SAT-based cryptanalysis. 463-474 - Mingxing Hu, Qing Ye, Yongli Tang:

Efficient batch identity-based fully homomorphic encryption scheme in the standard model. 475-483 - Lin Jiao, Yongqiang Li, Yonglin Hao:

Guess-and-determine attacks on PANAMA-like stream ciphers. 484-497 - Jiayang Liu, Jingguo Bi:

Equivalent key attack against a public-key cryptosystem based on subset sum problem. 498-501 - Khundrakpam Johnson Singh

, Khelchandra Thongam
, Tanmay De:
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation. 502-512 - Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:

Improved integral attacks without full codebook. 513-520 - Amor Gueddana

, Vasudevan Lakshminarayanan
:
Physical feasibility of QKD based on probabilistic quantum circuits. 521-526 - Jian Zou, Le Dong

, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. 527-533 - Guangliang Xu

, Wei Yang, Liusheng Huang:
Supervised learning framework for covert channel detection in LTE-A. 534-542 - Mohammad Taherifard, Ahmad Patooghy

, Mahdi Fazeli
:
Vulnerability modelling of crypto-chips against scan-based attacks. 543-550 - Md. Mokammel Haque

, Josef Pieprzyk
:
Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm. 551-557 - Mina Sadat Khazaei, Hossein Homaei

, Hamid Reza Shahriari
:
OPEXA: analyser assistant for detecting over-privileged extensions. 558-565

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














