


default search action
IET Information Security, Volume 12
Volume 12, Number 1, January 2018
- Kamaldeep, Manisha Malik
, Maitreyee Dutta
:
Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks. 1-6 - Junjie Lv, Juling Rong:
Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model. 7-14 - Golnar Assadat Afzali, Shahriar Mohammadi:
Privacy preserving big data mining: association rule hiding using fuzzy logic approach. 15-24 - Hridoy Jyoti Mahanta, Ajoy Kumar Khan:
Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation. 25-33 - Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref:
A provably secure code-based concurrent signature scheme. 34-41 - Shijun Xiang, Jiayong He:
Database authentication watermarking scheme in encrypted domain. 42-51 - Sébastien Canard, Duong Hieu Phan
, Viet Cuong Trinh
:
Attribute-based broadcast encryption scheme for lightweight devices. 52-59 - Hassan Seifi, Saeed Parsa
:
Mining malicious behavioural patterns. 60-70 - Zheng Yang
, Junyu Lai, Guoyuan Li
:
Cryptanalysis of a generic one-round key exchange protocol with strong security. 71-78 - María Isabel González Vasco
, Angel L. Pérez del Pozo, Adriana Suárez Corona
:
Group key exchange protocols withstanding ephemeral-key reveals. 79-86 - Kai Zhang
, Jie Guan, Bin Hu, Dongdai Lin:
Security evaluation on Simeck against zero-correlation linear cryptanalysis. 87-93 - En Zhang, Jie Peng, Ming Li:
Outsourcing secret sharing scheme based on homomorphism encryption. 94-99 - Shaoquan Jiang, Jue Li, Yongjian Liao:
Efficient approximate message authentication scheme. 100-106
Volume 12, Number 2, March 2018
- Abdurrahman Pektas, Tankut Acarman:
Malware classification based on API calls and behaviour analysis. 107-117 - William J. Buchanan
, Scott Helme, Alan Woodward
:
Analysis of the adoption of security headers in HTTP. 118-126 - Shuaijianni Xu, Liang Feng Zhang:
Cryptanalysis of Morillo-Obrador polynomial delegation schemes. 127-132 - Jianxiong Shao, Yu Qin, Dengguo Feng:
Formal analysis of HMAC authorisation in the TPM2.0 specification. 133-140 - Shangping Wang, Xia Zhang
, Yaling Zhang:
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. 141-149 - Girraj Kumar Verma
, B. B. Singh:
Efficient identity-based blind message recovery signature scheme from pairings. 150-156 - Xiaonan Wang, Zhengxiong Dou, Yi Mu:
CCN framework with privacy support. 157-164
Volume 12, Number 3, May 2018
- Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference. 165
- Nils Fleischhacker
, Johannes Krupp
, Giulio Malavolta
, Jonas Schneider, Dominique Schröder
, Mark Simkin:
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. 166-183 - Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:
Practical attribute-based signature schemes for circuits from bilinear map. 184-193 - Sebastian Meiser, Dominique Schröder
:
Delegatable functional signatures. 194-206 - Angelo De Caro, Vincenzo Iovino
, Adam O'Neill:
Receiver- and sender-deniable functional encryption. 207-216 - Samuel Neves
, Mehdi Tibouchi:
Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. 217-225 - Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng:
Mimic defense: a designed-in cybersecurity defense framework. 226-237 - Nader Sohrabi Safa
, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. 238-245
Volume 12, Number 4, July 2018
- Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016). 247
- Vincenzo Iovino
, Qiang Tang
, Karol Zebrowski:
Power of public-key function-private functional encryption. 248-256 - Eunkyung Kim, Mehdi Tibouchi:
FHE over the integers and modular arithmetic circuits. 257-264 - Yusuke Naito:
Sandwich construction for keyed sponges: independence between capacity and construction queries. 265-274 - Sergio de los Santos, José Torres:
Analysing HSTS and HPKP implementation in both browsers and servers. 275-284 - Emad S. Hassan
, Amir Salah Elsafrawey
, Moawad I. Dessouky:
Trade-off between self-healing and energy consumption in mobile unattended WSNs. 285-292 - Deepak Rewadkar, Dharmapal Dronacharya Doye:
Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET. 293-304 - Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang:
Protect white-box AES to resist table composition attacks. 305-313 - Sadegh Sadeghi
, Nasour Bagheri
:
Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. 314-325 - Zhe Xia, Zheng Tong, Min Xiao
, Chin-Chen Chang:
Framework for practical and receipt-free remote voting. 326-331 - Menaga Devendran
, Revathi Sathya
:
Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding. 332-340 - Özgü Can
:
Personalised anonymity for microdata release. 341-347 - Meltem Kurt PehlIvanoõlu
, Muharrem Tolga Sakalli, Sedat Akleylek
, Nevcihan Duru
, Vincent Rijmen
:
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. 348-355 - Yongkang Tang, Shaoqing Li, Fan Zhang, Liang Fang:
Thermal maps based HT detection using spatial projection transformation. 356-361 - Yaojun Hao, Fuzhi Zhang:
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features. 362-374 - Yuan Ping
, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du
:
Deterministic lattice reduction on knapsacks with collision-free properties. 375-380 - ThienLuan Ho, Seong-Je Cho, Seungrohk Oh:
Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units. 381-388
Volume 12, Number 5, September 2018
- Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. 389-397 - Tzuo-Yau Fan, Her-Chang Chao:
User-friendly XOR-based visual secret sharing by random grid. 398-403 - Guillermo Suarez-Tangil
, Santanu Kumar Dash
, Pedro García-Teodoro
, José Camacho
, Lorenzo Cavallaro
:
Anomaly-based exploratory analysis and detection of exploits in android mediaserver. 404-413 - Zhixiong Chen:
Linear complexity of Legendre-polynomial quotients. 414-418 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:
Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. 419-424 - Dan Wang, Bing Guo, Yan Shen:
Method for measuring the privacy level of pre-published dataset. 425-430 - Tao Chen
, Michael Farcasin
, Eric Chan-Tin:
Smartphone passcode prediction. 431-437 - Penglin Yang, Limin Tao, Haitao Wang:
RTTV: a dynamic CFI measurement tool based on TPM. 438-444 - Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei:
Sequential opening multi-jammers localisation in multi-hop wireless network. 445-454 - Emre Yüce, Ali Aydin Selçuk
:
Server notaries: a complementary approach to the web PKI trust model. 455-461
Volume 12, Number 6, November 2018
- Frédéric Lafitte
:
CryptoSAT: a tool for SAT-based cryptanalysis. 463-474 - Mingxing Hu, Qing Ye, Yongli Tang:
Efficient batch identity-based fully homomorphic encryption scheme in the standard model. 475-483 - Lin Jiao, Yongqiang Li, Yonglin Hao:
Guess-and-determine attacks on PANAMA-like stream ciphers. 484-497 - Jiayang Liu, Jingguo Bi:
Equivalent key attack against a public-key cryptosystem based on subset sum problem. 498-501 - Khundrakpam Johnson Singh
, Khelchandra Thongam
, Tanmay De:
Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation. 502-512 - Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. 513-520 - Amor Gueddana
, Vasudevan Lakshminarayanan
:
Physical feasibility of QKD based on probabilistic quantum circuits. 521-526 - Jian Zou, Le Dong
, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. 527-533 - Guangliang Xu
, Wei Yang, Liusheng Huang:
Supervised learning framework for covert channel detection in LTE-A. 534-542 - Mohammad Taherifard, Ahmad Patooghy
, Mahdi Fazeli
:
Vulnerability modelling of crypto-chips against scan-based attacks. 543-550 - Md. Mokammel Haque
, Josef Pieprzyk
:
Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm. 551-557 - Mina Sadat Khazaei, Hossein Homaei
, Hamid Reza Shahriari
:
OPEXA: analyser assistant for detecting over-privileged extensions. 558-565

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.