default search action
IET Information Security, Volume 13
Volume 13, Number 1, 2019
- Qian Li, Rangding Wang, Dawen Xu:
Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients. 1-6 - Nilesh Chakraborty, Samrat Mondal:
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. 7-18 - Seyyedeh Atefeh Musavi, Mahmoud Reza Hashemi:
HPCgnature: a hardware-based application-level intrusion detection system. 19-26 - Richard Rivera, Platon Kotzias, Avinash Sudhodanan, Juan Caballero:
Costly freeware: a systematic analysis of abuse in download portals. 27-35 - Miodrag J. Mihaljevic, Frédérique E. Oggier:
Security evaluation and design elements for a class of randomised encryptions. 36-47 - Yang Jia, Meng Wang, Yagang Wang:
Network intrusion detection algorithm based on deep neural network. 48-53 - Bardiya Barari, Pedram Kheirkhah Sangdeh, Bahareh Akhbari:
Secure degrees of freedom of two-user X-channel with synergistic alternating channel state information at transmitters. 54-60 - Cheng Guo, Pengxu Tian, Chin-Chen Chang:
Privacy preserving weighted similarity search scheme for encrypted data. 61-69 - Rongjia Li, Chenhui Jin:
Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC. 70-75 - Hyungyu Lee, Changwoo Pyo, Gyungho Lee:
Dynamic reencryption of return addresses. 76-85
Volume 13, Number 2, 2019
- Wenying Zhang, Vincent Rijmen:
Division cryptanalysis of block ciphers with a binary diffusion layer. 87-95 - Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. 96-103 - Huawang Qin, Raylin Tso, Yuewei Dai:
Quantum secret sharing by using Fourier transform on orbital angular momentum. 104-108 - Weijie Han, Jingfeng Xue, Hui Yan:
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. 109-116 - Yongzhuang Wei, Fu Yao, Enes Pasalic, An Wang:
New second-order threshold implementation of AES. 117-124 - Yafei Zheng, Wenling Wu:
On the extension and security of key schedule of GOST. 125-132 - Aniket Bhadane, Sunil B. Mane:
Detecting lateral spear phishing attacks in organisations. 133-140 - Jun-Zhi Li, Jie Guan:
Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1. 141-148 - Rongrong Xi, Xiaochun Yun, Zhiyu Hao:
Framework for risk assessment in cyber situational awareness. 149-156 - Qiang Zhang, Jianzhong Qiao, Qingyang Meng:
Build a trusted storage system on a mobile phone. 157-166
Volume 13, Number 3, 2019
- Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu:
Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model. 167-173 - Fuzhi Zhang, Zhoujun Ling, Shilei Wang:
Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours. 174-187 - Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu:
HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering. 188-200 - Somayeh Soltani, Seyed-Amin Hosseini-Seno, Hadi Sadoghi Yazdi:
Event reconstruction using temporal pattern of file system modification. 201-212 - Ghania Ait Abdelmalek, Rezki Ziani, Rabah Mokdad:
Security and fault tolerance evaluation of TMR-QDI circuits. 213-222 - Muhammad Sohail, Liangmin Wang, Shunrong Jiang, Samar Zaineldeen, Rana Umair Ashraf:
Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic. 223-230 - Aashish Parihar, Sangeeta Nakhate:
Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem. 231-238 - Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte, Óscar López:
Impact assessment of policy expressiveness of an optimised access control model for smart sensors. 239-248 - Bekir Unlu:
Base for algebraic cryptanalysis based on combined representation of S-box. 249-257 - Zhigang Zhang, Chaowen Chang, Zhimin Guo, PeiSheng Han:
Re-definable access control over outsourced data in cloud storage systems. 258-268 - Ahmet Ilhan Aysan, Fatih Sakiz, Sevil Sen:
Analysis of dynamic code updating in Android with security perspective. 269-277 - Maryam Sheikhi-Garjan, Mojtaba Bahramian, Christophe Doche:
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. 278-284 - Meng Yue, Zhijun Wu, Jingjie Wang:
Detecting LDoS attack bursts based on queue distribution. 285-292
Volume 13, Number 4, 2019
- Mehran Alidoost Nia, Behnam Bahrak, Mehdi Kargahi, Benjamin Fabian:
Detecting new generations of threats using attribute-based attack graphs. 293-303 - Maamar Ouladj, Phillipe Guillot, Farid Mokrane:
Chosen message strategy to improve the correlation power analysis. 304-310 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
PriVeto: a fully private two-round veto protocol. 311-320 - J. Anitha Ruth, H. Sirmathi, A. Meenakshi:
Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks. 321-329 - Xiaona Zhang, Li-Ping Wang, Jun Xu:
Certifying multi-power RSA. 330-335 - Mahnaz Noroozi, Ziba Eslami:
Public key authenticated encryption with keyword search: revisited. 336-342 - Massoud Hadian Dehkordi, Hossein Oraei:
How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. 343-351 - Ali Moradi Vartouni, Mohammad Teshnehlab, Saeed Sedighian Kashi:
Leveraging deep neural networks for anomaly-based web application firewall. 352-361 - Marta Conde Pena, Raúl Durán Díaz, Jean-Charles Faugère, Luis Hernández Encinas, Ludovic Perret:
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme. 362-366 - Mingdong Tang, Quan Qian:
Dynamic API call sequence visualisation for malware classification. 367-377 - Dhiman Saha, Sourya Kakarla, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. 378-388 - Yizhi Zhao, Shiwei Xu, Hongmei Chi:
Encrypted secure polar coding scheme for general two-way wiretap channel. 393-403 - Marco Baldi, Franco Chiaraluce, Joachim Rosenthal, Paolo Santini, Davide Schipani:
Security of generalised Reed-Solomon code-based cryptosystems. 404-410
Volume 13, Number 5, 2019
- Lin Jiao, Yonglin Hao, Yongqiang Li:
Improved guess-and-determine attack on TRIVIUM. 411-419 - Jin-Yuan Wang, Sheng-Hong Lin, Wei Cai, Jianxin Dai:
ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels. 420-425 - Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:
Identity-based encryption resilient to continuous key leakage. 426-434 - Matej Zuzcak, Petr Bujok:
Causal analysis of attacks against honeypots based on properties of countries. 435-447 - Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
S-boxes representation and efficiency of algebraic attack. 448-458 - Parvin Rastegari, Mohammad Dakhilalian, Mehdi Berenjkoub, Willy Susilo:
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. 459-468 - Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:
New zero-sum distinguishers on full 24-round Keccak-f using the division property. 469-478 - Lingchen Li, Wenling Wu, Lei Zhang, Yafei Zheng:
New method to describe the differential distribution table for large S-boxes in MILP and its application. 479-485 - Morteza Noferesti, Rasool Jalili:
Inline high-bandwidth network analysis using a robust stream clustering algorithm. 486-495 - David Nuñez, Isaac Agudo, Javier López:
Escrowed decryption protocols for lawful interception of encrypted data. 498-507 - Bagher Bagherpour, Ali Zaghian, Mahdi Sajadieh:
Sigma protocol for faster proof of simultaneous homomorphism relations. 508-514 - Tianfeng Sun, Bin Hu, Yang Yang:
Research on highly non-linear plateaued functions. 515-518
Volume 13, Number 6, 2019
- Zhouhang Cheng, Haichang Gao, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei:
Image-based CAPTCHAs based on neural style transfer. 519-529 - Iman Vakilinia, Shamik Sengupta:
Fair and private rewarding in a coalitional game of cybersecurity information sharing. 530-540 - Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia:
Dynamical model for individual defence against cyber epidemic attacks. 541-551 - Athmane Seghier, Jianxin Li, Dazhi Sun:
Advanced encryption standard based on key dependent S-Box cube. 552-558 - Samir Hodzic, Enes Pasalic, Yongzhuang Wei:
Guess and determine cryptanalysis with variable sampling and its applications. 559-569 - Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis:
Transforming malicious code to ROP gadgets for antivirus evasion. 570-578 - Huiqin Xie, Li Yang:
Witness indistinguishability and witness hiding against quantum attacks. 579-590 - Kakumani K. C. Deepthi, Kunwar Singh:
Cryptanalysis for reduced round Salsa and ChaCha: revisited. 591-602 - Deepak Kumar Dalai, Subhamoy Maitra, Santu Pal, Dibyendu Roy:
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs. 603-613 - SrinivasaRao SubramanyaRao, Zhi Hu, Chang-An Zhao:
Division polynomial-based elliptic curve scalar multiplication revisited. 614-617 - Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin:
Multi-key homomorphic authenticators. 618-638 - Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. 639-648 - Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:
Enhanced secure data backup scheme using multi-factor authentication. 649-658 - Waleed Ali, Adel Ali Ahmed:
Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. 659-669 - Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides:
Leakage-resilient lattice-based partially blind signatures. 670-684 - Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang:
Revisiting BGG+14 ABE with weakness analysis. 685-691 - Prathiba Ashok, Kanchana Bhaaskaran Vettuvanam Somasundaram:
Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks. 692-702 - Jikai Teng, Hongyang Ma:
Dynamic asymmetric group key agreement protocol with traitor traceability. 703-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.