default search action
IET Information Security, Volume 14
Volume 14, Number 1, 2020
- Shitharth Selvarajan, Masood Shaik, Sirajudeen Ameerjohn, Sangeetha Kannan:
Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm. 1-11 - Ling Sun, Wei Wang, Meiqin Wang:
MILP-aided bit-based division property for primitives with non-bit-permutation linear layers. 12-20 - Ikram Gharsallah, Salima Smaoui, Faouzi Zarai:
An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks. 21-29 - Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du:
Implementing confidential transactions with lattice techniques. 30-38 - Hisham A. Kholidy:
Correlation-based sequence alignment models for detecting masquerades in cloud computing. 39-50 - Thomas Shortell, Ali Shokoufandeh:
Secure signal processing using fully homomorphic encryption. 51-59 - Junaid Akram, Ping Luo:
How to build a vulnerability benchmark to overcome cyber security attacks. 60-71 - Zahra Eskandari, Abbas Ghaemi Bafghi:
Cube distinguisher extraction using division property in block ciphers. 72-80 - Jian Wang, Guosheng Zhao, Zhong-Nan Zhao, Zhixin Li:
Dynamic resource virtualisation method for survivability enhancement based on SDN. 82-88 - Nadjah Chergui, Boustia Narhimene:
Contextual-based approach to reduce false positives. 89-98 - Xuelian Li, Yue Han, Juntao Gao, Jie Niu:
Secure hierarchical authentication protocol in VANET. 99-110 - Lin Jiao:
Specifications and improvements of LPN solving algorithms. 111-125 - Rongjia Li, Chenhui Jin, Hongchen Pan:
Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions. 126-132 - Mohammad Shakibazad, Ali Jabbar Rashidi:
New method for assets sensitivity calculation and technical risks assessment in the information systems. 133-145 - Arkadii Slinko:
Ways to merge two secret sharing schemes. 146-150
Volume 14, Number 2, 2020
- Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami:
New single-trace side-channel attacks on a specific class of Elgamal cryptosystem. 151-156 - Yawen Wang, Yunfei Guo, Zehua Guo, Wenyan Liu, Chao Yang:
Protecting scientific workflows in clouds with an intrusion tolerant system. 157-165 - Rui-Hong Dong, Xue-Yong Li, Qiu-Yu Zhang, Hui Yuan:
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network. 166-174 - Xiaoyang Liu, Jiamiao Liu:
Novel non-linear dynamics P2P network worm propagation and immune model. 175-184 - Jun Liu, Jia Yan, Dexiang Deng, Ruijue Zhang:
Fingerprint image quality assessment based on BP neural network with hierarchical clustering. 185-195 - Dung Hoang Duong, Le Van Luyen, Ha Thanh Nguyen Tran:
Choosing subfields for LUOV and lifting fields for rainbow. 196-201 - Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany:
Framework for faster key search using related-key higher-order differential properties: applications to Agrasta. 202-209 - Nazanin Bakhshinejad, Ali Hamzeh:
Parallel-CNN network for malware detection. 210-219 - Binbin Tu, Yu Chen, Xueli Wang:
Threshold trapdoor functions and their applications. 220-231 - Ziwang Wang, Yi Zhuang, Qingxun Xia:
Mutual authentication-based RA scheme for embedded systems. 232-240 - Miguel Rodríguez-Veliz, Yulier Nuñez-Musa, Roberto Sepúlveda Lima:
Call graph obfuscation and diversification: an approach. 241-252
Volume 14, Number 3, 2020
- Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS). 253
- Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster privacy-preserving location proximity schemes for circles and polygons. 254-265 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully invisible protean signatures schemes. 266-285 - Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda:
Impact of the modulus switching technique on some attacks against learning problems. 286-303 - Paolo Santini, Marco Baldi, Franco Chiaraluce:
Complexity of statistical attacks on QC-LDPC code-based cryptosystems. 304-312 - Zhen Liu, Yanbin Pan, Tianyuan Xie:
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project. 313-320 - Ji Li, Jianghong Wei, Mao Ye, Wenfen Liu, Xuexian Hu:
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets. 321-331 - Fariba Khazaei Koohpar, Afsaneh Fatemi, Fatemeh Raji:
Data availability improvement in peer-to-peer online social networks. 332-341 - Xuyang Wang, Aiqun Hu, Hao Fang:
Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice. 342-351 - Mahmoud Ghorbanzadeh, Hamid Reza Shahriari:
ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis. 352-364 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks. 365-366
Volume 14, Number 4, 2020
- Guest Editorial: Security on Mobile and IoT Devices. 367
- Max Ingham, Jims Marchang, Deepayan Bhowmik:
IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN. 368-379 - Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu:
Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs. 380-390 - Amit Kumar Roy, Ajoy Kumar Khan:
Privacy preservation with RTT-based detection for wireless mesh networks. 391-400 - Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao:
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process. 401-409 - Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis:
Security analysis of KAP based on enhanced MPF. 410-418 - Lahouari Ghouti, Muhammad Imam:
Malware classification using compact image features and multiclass support vector machines. 419-429 - Chen-Dong Ye, Tian Tian:
Algebraic method to recover superpolies in cube attacks. 430-441 - Qi Feng, Debiao He, Zhe Liu, Ding Wang, Kim-Kwang Raymond Choo:
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. 443-451 - Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee:
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network. 452-458 - Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy:
Scan-based attack tolerance with minimum testability loss: a gate-level approach. 459-469 - Jinguo Li, Mi Wen, Kai Zhang:
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids. 470-481
Volume 14, Number 5, 2020
- Congming Wei, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. 483-492 - Dipayan Das, Vishal Saraswat, Kajla Basu:
Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems. 496-504 - Yaxin Cui, Hong Xu, Wenfeng Qi:
Improved integral attacks on 24-round LBlock and LBlock-s. 505-512 - Uthirapathy Palani, Gopal Amuthavalli, Vaithiyanathan Alamelumangai:
Secure and load-balanced routing protocol in wireless sensor network or disaster management. 513-520 - Sreyosi Bhattacharyya, Palash Sarkar:
Improved SIMD implementation of Poly1305. 521-530 - Janani Thiyagarajan, A. Akash, Brindha Murugan:
Improved real-time permission based malware detection and clustering approach using model independent pruning. 531-541 - Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Threat model and construction strategy on ADS-B attack data. 542-552 - Alireza Toroghi Haghighat, Mehdi Shajari:
Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools. 553-561 - Wen Wen Koh, Chai Wen Chuah:
Robust security framework with bit-flipping attack and timing attack for key derivation functions. 562-571 - Wenqiang Tian, Bin Hu:
Integral cryptanalysis on two block ciphers Pyjamask and uBlock. 572-579 - Yu Ou, Lang Li:
Research on a high-order AES mask anti-power attack. 580-586 - Sudong Ma, Jie Guan:
Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕. 587-594 - Elnaz Bagherzadeh, Zahra Ahmadian:
MILP-based automatic differential search for LEA and HIGHT block ciphers. 595-603 - Mojtaba Zaheri, Babak Sadeghiyan:
SMT-based cube attack on round-reduced Simeck32/64. 604-611
Volume 14, Number 6, November 2020
- Toru Nakanishi, Takeshi Kanatani:
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator. 613-624 - Eman Abouelkheir, Shamia El-sherbiny:
Pairing free identity based aggregate signcryption scheme. 625-632 - Kaushik Nath, Palash Sarkar:
Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level. 633-640 - Geng Li, Jianwei Liu, Zongyang Zhang:
More realistic analysis of mass surveillance - security in multi-surveillant settings. 641-653 - Shishi Liu, Fengrong Zhang, Enes Pasalic, Shixiong Xia, Zepeng Zhuo:
Further study on constructing bent functions outside the completed Maiorana-McFarland class. 654-660 - Sumit Kumar Debnath, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu:
Post-quantum protocol for computing set intersection cardinality with linear complexity. 661-669 - Sona Alex, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran:
SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby. 670-682 - Emre Dandil:
C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic. 683-693 - Samaneh Hosseini Moghaddam, Maghsoud Abbaspour:
Economic feasibility study for stealthy socialbot network establishment. 694-703 - Mukti Padhya, Devesh C. Jinwala:
P2 KASE A2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation. 704-723 - Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. 724-732 - Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:
Achieving secure and convenient WLAN sharing in personal. 733-744 - Neha Sharma, Jeebananda Panda:
Statistical watermarking approach for 3D mesh using local curvature estimation. 745-753 - Farhad Farokhi:
Non-stochastic hypothesis testing for privacy. 754-763 - Runzhi Zeng, Libin Wang:
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem. 764-772 - Ishu Gupta, Ashutosh Kumar Singh:
GUIM-SMD: guilty user identification model using summation matrix-based distribution. 773-782 - Jing Yang, Fang-Wei Fu:
New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem. 783-790
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.