


default search action
IET Information Security, Volume 14
Volume 14, Number 1, 2020
- Shitharth Selvarajan

, Masood Shaik, Sirajudeen Ameerjohn, Sangeetha Kannan:
Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm. 1-11 - Ling Sun, Wei Wang, Meiqin Wang:

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. 12-20 - Ikram Gharsallah, Salima Smaoui, Faouzi Zarai

:
An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks. 21-29 - Huang Zhang

, Fangguo Zhang
, Baodian Wei, Yusong Du:
Implementing confidential transactions with lattice techniques. 30-38 - Hisham A. Kholidy

:
Correlation-based sequence alignment models for detecting masquerades in cloud computing. 39-50 - Thomas Shortell

, Ali Shokoufandeh:
Secure signal processing using fully homomorphic encryption. 51-59 - Junaid Akram

, Ping Luo:
How to build a vulnerability benchmark to overcome cyber security attacks. 60-71 - Zahra Eskandari, Abbas Ghaemi Bafghi:

Cube distinguisher extraction using division property in block ciphers. 72-80 - Jian Wang

, Guosheng Zhao, Zhong-Nan Zhao, Zhixin Li:
Dynamic resource virtualisation method for survivability enhancement based on SDN. 82-88 - Nadjah Chergui

, Boustia Narhimene:
Contextual-based approach to reduce false positives. 89-98 - Xuelian Li, Yue Han

, Juntao Gao
, Jie Niu:
Secure hierarchical authentication protocol in VANET. 99-110 - Lin Jiao

:
Specifications and improvements of LPN solving algorithms. 111-125 - Rongjia Li, Chenhui Jin, Hongchen Pan:

Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions. 126-132 - Mohammad Shakibazad, Ali Jabbar Rashidi:

New method for assets sensitivity calculation and technical risks assessment in the information systems. 133-145 - Arkadii Slinko:

Ways to merge two secret sharing schemes. 146-150
Volume 14, Number 2, 2020
- Parinaz Mahdion, Hadi Soleimany

, Pouya Habibi, Farokhlagha Moazami:
New single-trace side-channel attacks on a specific class of Elgamal cryptosystem. 151-156 - Yawen Wang, Yunfei Guo, Zehua Guo

, Wenyan Liu, Chao Yang:
Protecting scientific workflows in clouds with an intrusion tolerant system. 157-165 - Rui-Hong Dong, Xue-Yong Li, Qiu-Yu Zhang

, Hui Yuan:
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network. 166-174 - Xiaoyang Liu, Jiamiao Liu:

Novel non-linear dynamics P2P network worm propagation and immune model. 175-184 - Jun Liu, Jia Yan, Dexiang Deng, Ruijue Zhang:

Fingerprint image quality assessment based on BP neural network with hierarchical clustering. 185-195 - Dung Hoang Duong

, Le Van Luyen, Ha Thanh Nguyen Tran
:
Choosing subfields for LUOV and lifting fields for rainbow. 196-201 - Christoph Dobraunig

, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany
:
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta. 202-209 - Nazanin Bakhshinejad, Ali Hamzeh

:
Parallel-CNN network for malware detection. 210-219 - Binbin Tu

, Yu Chen, Xueli Wang:
Threshold trapdoor functions and their applications. 220-231 - Ziwang Wang

, Yi Zhuang
, Qingxun Xia:
Mutual authentication-based RA scheme for embedded systems. 232-240 - Miguel Rodríguez-Veliz

, Yulier Nuñez-Musa, Roberto Sepúlveda Lima:
Call graph obfuscation and diversification: an approach. 241-252
Volume 14, Number 3, 2020
- Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS). 253

- Kimmo Järvinen, Ágnes Kiss, Thomas Schneider

, Oleksandr Tkachenko, Zheng Yang
:
Faster privacy-preserving location proximity schemes for circles and polygons. 254-265 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig

:
Fully invisible protean signatures schemes. 266-285 - Huy Quoc Le

, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong
, Masaya Yasuda:
Impact of the modulus switching technique on some attacks against learning problems. 286-303 - Paolo Santini

, Marco Baldi
, Franco Chiaraluce:
Complexity of statistical attacks on QC-LDPC code-based cryptosystems. 304-312 - Zhen Liu, Yanbin Pan, Tianyuan Xie:

Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project. 313-320 - Ji Li

, Jianghong Wei, Mao Ye, Wenfen Liu, Xuexian Hu:
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets. 321-331 - Fariba Khazaei Koohpar, Afsaneh Fatemi, Fatemeh Raji

:
Data availability improvement in peer-to-peer online social networks. 332-341 - Xuyang Wang, Aiqun Hu, Hao Fang:

Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice. 342-351 - Mahmoud Ghorbanzadeh, Hamid Reza Shahriari

:
ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis. 352-364 - Michel Abdalla

, Fabrice Benhamouda
, David Pointcheval:
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks. 365-366
Volume 14, Number 4, 2020
- Guest Editorial: Security on Mobile and IoT Devices. 367

- Max Ingham, Jims Marchang, Deepayan Bhowmik:

IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN. 368-379 - Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu:

Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs. 380-390 - Amit Kumar Roy, Ajoy Kumar Khan:

Privacy preservation with RTT-based detection for wireless mesh networks. 391-400 - Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao:

Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process. 401-409 - Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis:

Security analysis of KAP based on enhanced MPF. 410-418 - Lahouari Ghouti

, Muhammad Imam
:
Malware classification using compact image features and multiclass support vector machines. 419-429 - Chen-Dong Ye, Tian Tian:

Algebraic method to recover superpolies in cube attacks. 430-441 - Qi Feng, Debiao He

, Zhe Liu, Ding Wang
, Kim-Kwang Raymond Choo
:
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. 443-451 - Hongsong Chen

, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee:
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network. 452-458 - Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy:

Scan-based attack tolerance with minimum testability loss: a gate-level approach. 459-469 - Jinguo Li, Mi Wen, Kai Zhang

:
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids. 470-481
Volume 14, Number 5, 2020
- Congming Wei

, Jiazhe Chen
, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. 483-492 - Dipayan Das

, Vishal Saraswat
, Kajla Basu
:
Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems. 496-504 - Yaxin Cui, Hong Xu, Wenfeng Qi:

Improved integral attacks on 24-round LBlock and LBlock-s. 505-512 - Uthirapathy Palani, Gopal Amuthavalli, Vaithiyanathan Alamelumangai:

Secure and load-balanced routing protocol in wireless sensor network or disaster management. 513-520 - Sreyosi Bhattacharyya, Palash Sarkar:

Improved SIMD implementation of Poly1305. 521-530 - Janani Thiyagarajan

, A. Akash, Brindha Murugan
:
Improved real-time permission based malware detection and clustering approach using model independent pruning. 531-541 - Tengyao Li

, Buhong Wang, Fute Shang, Jiwei Tian
, Kunrui Cao:
Threat model and construction strategy on ADS-B attack data. 542-552 - Alireza Toroghi Haghighat, Mehdi Shajari:

Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools. 553-561 - Wen Wen Koh, Chai Wen Chuah

:
Robust security framework with bit-flipping attack and timing attack for key derivation functions. 562-571 - Wenqiang Tian

, Bin Hu:
Integral cryptanalysis on two block ciphers Pyjamask and uBlock. 572-579 - Yu Ou

, Lang Li
:
Research on a high-order AES mask anti-power attack. 580-586 - Sudong Ma, Jie Guan:

Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕. 587-594 - Elnaz Bagherzadeh, Zahra Ahmadian

:
MILP-based automatic differential search for LEA and HIGHT block ciphers. 595-603 - Mojtaba Zaheri, Babak Sadeghiyan:

SMT-based cube attack on round-reduced Simeck32/64. 604-611
Volume 14, Number 6, November 2020
- Toru Nakanishi

, Takeshi Kanatani:
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator. 613-624 - Eman Abouelkheir, Shamia El-sherbiny:

Pairing free identity based aggregate signcryption scheme. 625-632 - Kaushik Nath, Palash Sarkar:

Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level. 633-640 - Geng Li, Jianwei Liu

, Zongyang Zhang
:
More realistic analysis of mass surveillance - security in multi-surveillant settings. 641-653 - Shishi Liu, Fengrong Zhang, Enes Pasalic, Shixiong Xia, Zepeng Zhuo:

Further study on constructing bent functions outside the completed Maiorana-McFarland class. 654-660 - Sumit Kumar Debnath

, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu:
Post-quantum protocol for computing set intersection cardinality with linear complexity. 661-669 - Sona Alex

, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran
:
SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby. 670-682 - Emre Dandil

:
C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic. 683-693 - Samaneh Hosseini Moghaddam, Maghsoud Abbaspour:

Economic feasibility study for stealthy socialbot network establishment. 694-703 - Mukti Padhya, Devesh C. Jinwala

:
P2 KASE A2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation. 704-723 - Qi Feng, Debiao He

, Huaqun Wang
, Ding Wang
, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. 724-732 - Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:

Achieving secure and convenient WLAN sharing in personal. 733-744 - Neha Sharma

, Jeebananda Panda:
Statistical watermarking approach for 3D mesh using local curvature estimation. 745-753 - Farhad Farokhi

:
Non-stochastic hypothesis testing for privacy. 754-763 - Runzhi Zeng

, Libin Wang:
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem. 764-772 - Ishu Gupta, Ashutosh Kumar Singh:

GUIM-SMD: guilty user identification model using summation matrix-based distribution. 773-782 - Jing Yang

, Fang-Wei Fu:
New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem. 783-790

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














