


default search action
IET Information Security, Volume 15
Volume 15, Number 1, January 2021
- Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal:

Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes. 1-12 - Krishnaraj Bhat

, K. R. Udaya Kumar Reddy, Ranjan Kumar H. S.
, Dindayal Mahto:
A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography. 13-22 - Khalid T. Al-Sarayreh

, Mamdouh Alenezi
, Mohammad Zarour
, Kenza Meridji:
A reference measurement framework of software security product quality (SPQNFSR). 23-37 - Yassine Lemmou

, Jean-Louis Lanet
, El Mamoun Souidi
:
A behavioural in-depth analysis of ransomware infection. 38-58 - Cengiz Acartürk

, Murat Ulubay
, Efe Erdur
:
Continuous improvement on maturity and capability of Security Operation Centres. 59-75 - Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang:

Private feasible solution determination. 76-86 - Yanjun Li

, Jie Peng, Chik How Tan, Haibin Kan, Lijing Zheng
:
Further constructions of bent functions and their duals. 87-97 - Hossein Pilaram

, Taraneh Eghlidos
, Rahim Toluee:
An efficient lattice-based threshold signature scheme using multi-stage secret sharing. 98-106 - Guanhao Xue

, Baocang Wang, Quanbo Qu, Weidong Zhang:
Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature. 107-116 - Ozgur Oksuz:

Time-specific encrypted range query with minimum leakage disclosure. 117-130 - Yumei Li

, Futai Zhang, Yinxia Sun:
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system. 131-146
Volume 15, Number 2, March 2021
- Yupu Hu, Siyue Dong

, Xingting Dong:
Analysis on Aigis-Enc: Asymmetrical and symmetrical. 147-155 - Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:

Smart home: Keeping privacy based on Air-Padding. 156-168 - Marwan Ali Albahar

:
A hybrid model for fake news detection: Leveraging news content and user comments in fake news. 169-177 - Mohamed Hammad

, Nabil M. Hewahi
, Wael Elmedany:
T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems. 178-190 - Suliman A. Alsuhibany

, Latifah A. Alreshoodi
:
Detecting human attacks on text-based CAPTCHAs using the keystroke dynamic approach. 191-204
Volume 15, Number 3, May 2021
- Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari

:
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures. 205-222 - Chris J. Mitchell

:
How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. 223-230 - Sébastien Canard, Chaoyun Li

:
Towards practical intrusion detection system over encrypted traffic. 231-246 - Manman Li, Shaozhen Chen:

Improved meet-in-the-middle attacks on reduced-round Joltik-BC. 247-255 - Shivangi Shukla

, Sankita J. Patel:
Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment. 256-266
Volume 15, Number 4, July 2021
- Ye Yuan

, Kazuhide Fukushima
, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. 267-281 - Ferucio Laurentiu Tiplea, Constantin Catalin Dragan

:
Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures. 282-296 - Amin Sarihi

, Ahmad Patooghy
, Mahdi Amininasab, Mohammad Shokrolah Shirazi
, Abdel-Hameed A. Badawy:
Joint security and performance improvement in multilevel shared caches. 297-308 - Juha Partala

:
Indifferentiable hash functions in the standard model. 309-316 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay

:
Lattice-based nominative signature using pseudorandom function. 317-332
Volume 15, Number 5, September 2021
- Shimin Li, Bei Liang, Aikaterini Mitrokotsa

, Rui Xue:
Homomorphic signcryption with public plaintext-result checkability. 333-350 - Ming Chen, Jing Chen

, Xianglin Wei, Bing Chen:
Is low-rate distributed denial of service a great threat to the Internet? 351-363 - Daniel Cervantes-Vázquez

, Eduardo Ochoa-Jiménez
, Francisco Rodríguez-Henríquez
:
Extended supersingular isogeny Diffie-Hellman key exchange protocol: Revenge of the SIDH. 364-374 - Farhana Jabeen

, Zia-ur-Rehman Khan, Zara Hamid, Zobia Rehman, Abid Khan
:
Adaptive and survivable trust management for Internet of Things systems. 375-394
- Dachao Wang, Baocang Wang, Yuan Ping

:
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018. 395-400
Volume 15, Number 6, November 2021
- Xiangjun Li, Ke Kong

, Su Xu, Pengtao Qin, Daojing He
:
Feature selection-based android malware adversarial sample generation and detection method. 401-416 - Wonhee Cho

, Jiseung Kim
, Changmin Lee
:
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants. 417-427 - Xingting Dong

, Yupu Hu, Baocang Wang
, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. 428-441 - Qingyun Zhang

, Xing Zhang, Mingyue Wang, Xiaohui Li:
DPLQ: Location-based service privacy protection scheme based on differential privacy. 442-456 - Tao Hou, Ting Cui:

Yoyo trick on type-II generalised Feistel networks. 457-471 - Tanping Zhou

, Ningbo Li
, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. 472-486 - Yanjun Li

, Hao Lin
, Meng Liang, Ying Sun:
A new quantum cryptanalysis method on block cipher Camellia. 487-495

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














