Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Efficient multi-party quantum key agreement protocol based on new bell state encoding mode
International Journal of Information and Computer Security (IJICS), Volume 25, Issue 1-2Pages 18–30https://doi.org/10.1504/ijics.2024.142681Although there are many quantum key agreement protocols currently in existence, they cannot be merged in terms of resource utilisation, efficiency, security, and other aspects, and there are also significant differences in the nature of two and more ...
- research-articleFebruary 2024
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers
International Journal of Information and Computer Security (IJICS), Volume 23, Issue 1Pages 16–39https://doi.org/10.1504/ijics.2024.136710Although block ciphers are widely used and are quite secure, there are still many types of attacks against components of block ciphers, and the Advanced Encryption Standard (AES) block cipher is no exception. To improve the security of AES, there have ...
- research-articleJanuary 2023
Cryptanalysis of common prime RSA with two decryption exponents: Jochemsz and May approach
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 3-4Pages 377–389https://doi.org/10.1504/ijics.2023.135901RSA is a well-known public key cryptosystem in modern-day cryptography. Common prime RSA (CP-RSA) is a variant of RSA which is introduced by Wiener to avoid the small secret exponent attack on RSA. Lattice-based reduction algorithms were successfully ...
- research-articleJanuary 2023
Construction of weighted orthogonal matrices over finite field and its application in cryptography
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 3-4Pages 263–276https://doi.org/10.1504/ijics.2023.135894In this article, we propose a method to construct self-orthogonal matrix, orthogonal matrix and antiorthogonal matrix over the finite field. Orthogonal matrices have numerous applications in cryptography, so here we demonstrate the application of ...
- research-articleJanuary 2023
An effective ensemble method for missing data imputation
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 3-4Pages 295–314https://doi.org/10.1504/ijics.2023.128846The presence of missing data in a dataset plays a vital role in the design of classification, clustering, or regression methods. An efficient missing data imputation can enhance the overall performance of a machine learning method. This paper ensembles k-...
-
- research-articleJanuary 2023
A novel traceback model for DDoS attacks using modified Floyd-Warshall algorithm
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 1-2Pages 84–103https://doi.org/10.1504/ijics.2023.128003Distributed denial of service, DDoS, attacks are drastically increasing, therefore, they cause serious threats for information networks. This paper proposes, for the first time, the use of a graph theoretic approach to exploit the entropy techniques for ...
- research-articleJanuary 2023
Attack resistant chaos-based cryptosystem by modified baker map and logistic map
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 1-2Pages 48–83https://doi.org/10.1504/ijics.2023.128002In this paper, a new substitution-diffusion type chaos-based cryptosystem is proposed, which can encrypt greyscale images having arbitrary resolution. In substitution, image pixels are permuted using a modified form of the discretised 2-D Baker map, ...
- research-articleJanuary 2023
Searching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 1-2Pages 1–26https://doi.org/10.1504/ijics.2023.127999The tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-...
- research-articleJanuary 2022
Game theory approach for analysing attack graphs
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 3-4Pages 305–320https://doi.org/10.1504/ijics.2022.127139Many real problems involve the simultaneous security of computer networks and systems as it penetrates all areas of our daily lives. The purpose of attack graph analysis is to be able to protect computer systems and networks against attacks related to ...
- research-articleJanuary 2022
Robust message authentication in the context of quantum key distribution
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 3-4Pages 365–382https://doi.org/10.1504/ijics.2022.125276Universal hashing-based message authentication code (MAC) is used as the de facto method to achieve information-theoretically secure authentication in quantum key distribution. We present a critical look at the most widely used type, namely Wegman-Carter ...
- research-articleJanuary 2022
A hierarchical particle swarm optimisation algorithm for cloud computing environment
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-2Pages 12–26https://doi.org/10.1504/ijics.2022.122911Production scheduling and vehicle routing are integrated to solve a task scheduling problem with a timing requirement in cloud computing. The issues of multiple compute resources for a lot of tasks are considered. In the tasks scheduling problem, each ...
- research-articleJanuary 2022
Network traffic prediction based on least squares support vector machine with simple estimation of Gaussian kernel width
International Journal of Information and Computer Security (IJICS), Volume 18, Issue 1-2Pages 1–11https://doi.org/10.1504/ijics.2022.122910In order to improve the accuracy of network traffic prediction and overcome the disadvantages of slow convergence speed and easy to fall into local minimum value in the process of least squares support vector machine (LSSVM) network traffic prediction, a ...
- research-articleJanuary 2022
A new image encryption algorithm based on cascaded chaos and Arnold transform
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 3-4Pages 321–331https://doi.org/10.1504/ijics.2022.122377Aiming at the problem that the existing one-dimensional chaotic system has small chaotic interval, Lyapunov exponent is small and the generated chaotic sequence is unevenly distributed, and the correlation is high, a new image encryption algorithm is ...
- research-articleJanuary 2022
Adaptive steganographic scheme using a variable matrix embedding
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 3-4Pages 231–260https://doi.org/10.1504/ijics.2022.122373Steganography is the art of concealing secret information within digital media. In this paper, an adaptive steganographic scheme based on Faber-Schauder discrete wavelet transform (DWT) is proposed. Data is hidden in the details coefficients, which are ...
- research-articleJanuary 2022
Generalised multi release framework for fault determination with fault reduction factor
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1-2Pages 164–178https://doi.org/10.1504/ijics.2022.121296The huge dependability on software systems has led to the need of reliable software in a short span of time. One of the ways to achieve this is to provide a series of versions of the software system. Thus, firms release the first software version with the ...
- research-articleJanuary 2021
A layer-crossing multi-factor and dynamic security model over a moving target defence
International Journal of Information and Computer Security (IJICS), Volume 16, Issue 1-2Pages 150–169https://doi.org/10.1504/ijics.2021.117400Moving target defence mainly focus on the single parameter hopping and rarely refer to the hopping of multiple parameters in multiple layers. With the background of database security, this paper constructs a layer-crossing, multi-parameter and dynamic ...
- research-articleJanuary 2021
Empirical risk assessment of attack graphs using time to compromise framework
International Journal of Information and Computer Security (IJICS), Volume 16, Issue 1-2Pages 33–50https://doi.org/10.1504/ijics.2021.117393The proliferated complexity of network size together with the expeditious development of software system applications and their large number of vulnerabilities, security hardening is becoming a challenge for security specialists. Operating systems and ...
- research-articleJanuary 2021
Vulnerability severity prediction model for software based on Markov chain
International Journal of Information and Computer Security (IJICS), Volume 15, Issue 2-3Pages 109–140https://doi.org/10.1504/ijics.2021.116302Software vulnerabilities primarily constitute security risks. Commonalities between faults and vulnerabilities prompt developers to utilise traditional fault prediction models and metrics for vulnerability prediction. Although traditional models can ...
- research-articleJanuary 2021
A handwriting document encryption scheme based on segmentation and chaotic logarithmic map
International Journal of Information and Computer Security (IJICS), Volume 14, Issue 3-4Pages 327–343https://doi.org/10.1504/ijics.2021.114709A one-dimensional chaotic logarithmic map (CLM) is proposed. Characteristics of the CLM are investigated and used to develop a symmetric handwriting document encryption scheme that consists of three phases. The segmentation phase divides a handwriting ...
- research-articleJanuary 2021
Improved RSA lossy trapdoor function and applications
International Journal of Information and Computer Security (IJICS), Volume 14, Issue 3-4Pages 229–241https://doi.org/10.1504/ijics.2021.114703Kakvi and Kiltz (EUROCRYPT'12) proposed the first tight security reduction for RSA full domain hash signature scheme (RSA-FDH) with public exponent e < N1/4 in the random oracle (RO) model, and they left an open problem which called for a tightly secure ...