default search action
IET Information Security, Volume 15
Volume 15, Number 1, January 2021
- Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal:
Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes. 1-12 - Krishnaraj Bhat, K. R. Udaya Kumar Reddy, Ranjan Kumar H. S., Dindayal Mahto:
A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography. 13-22 - Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammad Zarour, Kenza Meridji:
A reference measurement framework of software security product quality (SPQNFSR). 23-37 - Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi:
A behavioural in-depth analysis of ransomware infection. 38-58 - Cengiz Acartürk, Murat Ulubay, Efe Erdur:
Continuous improvement on maturity and capability of Security Operation Centres. 59-75 - Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang:
Private feasible solution determination. 76-86 - Yanjun Li, Jie Peng, Chik How Tan, Haibin Kan, Lijing Zheng:
Further constructions of bent functions and their duals. 87-97 - Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee:
An efficient lattice-based threshold signature scheme using multi-stage secret sharing. 98-106 - Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang:
Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature. 107-116 - Ozgur Oksuz:
Time-specific encrypted range query with minimum leakage disclosure. 117-130 - Yumei Li, Futai Zhang, Yinxia Sun:
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system. 131-146
Volume 15, Number 2, March 2021
- Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: Asymmetrical and symmetrical. 147-155 - Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
Smart home: Keeping privacy based on Air-Padding. 156-168 - Marwan Ali Albahar:
A hybrid model for fake news detection: Leveraging news content and user comments in fake news. 169-177 - Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems. 178-190 - Suliman A. Alsuhibany, Latifah A. Alreshoodi:
Detecting human attacks on text-based CAPTCHAs using the keystroke dynamic approach. 191-204
Volume 15, Number 3, May 2021
- Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari:
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures. 205-222 - Chris J. Mitchell:
How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes. 223-230 - Sébastien Canard, Chaoyun Li:
Towards practical intrusion detection system over encrypted traffic. 231-246 - Manman Li, Shaozhen Chen:
Improved meet-in-the-middle attacks on reduced-round Joltik-BC. 247-255 - Shivangi Shukla, Sankita J. Patel:
Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment. 256-266
Volume 15, Number 4, July 2021
- Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. 267-281 - Ferucio Laurentiu Tiplea, Constantin Catalin Dragan:
Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures. 282-296 - Amin Sarihi, Ahmad Patooghy, Mahdi Amininasab, Mohammad Shokrolah Shirazi, Abdel-Hameed A. Badawy:
Joint security and performance improvement in multilevel shared caches. 297-308 - Juha Partala:
Indifferentiable hash functions in the standard model. 309-316 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Lattice-based nominative signature using pseudorandom function. 317-332
Volume 15, Number 5, September 2021
- Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue:
Homomorphic signcryption with public plaintext-result checkability. 333-350 - Ming Chen, Jing Chen, Xianglin Wei, Bing Chen:
Is low-rate distributed denial of service a great threat to the Internet? 351-363 - Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez:
Extended supersingular isogeny Diffie-Hellman key exchange protocol: Revenge of the SIDH. 364-374 - Farhana Jabeen, Zia-ur-Rehman Khan, Zara Hamid, Zobia Rehman, Abid Khan:
Adaptive and survivable trust management for Internet of Things systems. 375-394
- Dachao Wang, Baocang Wang, Yuan Ping:
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018. 395-400
Volume 15, Number 6, November 2021
- Xiangjun Li, Ke Kong, Su Xu, Pengtao Qin, Daojing He:
Feature selection-based android malware adversarial sample generation and detection method. 401-416 - Wonhee Cho, Jiseung Kim, Changmin Lee:
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants. 417-427 - Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. 428-441 - Qingyun Zhang, Xing Zhang, Mingyue Wang, Xiaohui Li:
DPLQ: Location-based service privacy protection scheme based on differential privacy. 442-456 - Tao Hou, Ting Cui:
Yoyo trick on type-II generalised Feistel networks. 457-471 - Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. 472-486 - Yanjun Li, Hao Lin, Meng Liang, Ying Sun:
A new quantum cryptanalysis method on block cipher Camellia. 487-495
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.