default search action
IET Information Security, Volume 11
Volume 11, Number 1, January 2017
- Hasan Taha, Emad Alsusa:
Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing. 1-7 - Xi Xiao, Zhenlong Wang, Qing Li, Shu-Tao Xia, Yong Jiang:
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences. 8-15 - Muhammad Nasir Mumtaz Bhutta, Haitham S. Cruickshank, Zhili Sun:
Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. 16-22 - Y. Sreenivasa Rao:
Signature-policy attribute-based key-insulated signature. 23-33 - Moon Sung Lee:
Sparse subset sum problem from Gentry-Halevi's fully homomorphic encryption. 34-37 - Wenjun Fan, David Fernández, Zhihui Du:
Versatile virtual honeynet management framework. 38-45 - Zhen Ma, Tian Tian, Wen-Feng Qi:
Improved conditional differential attacks on Grain v1. 46-53
Volume 11, Number 2, March 2017
- Xiangling Ding, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun:
Design of new scan orders for perceptual encryption of H.264/AVC videos. 55-65 - Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi:
High-performance and high-speed implementation of polynomial basis Itoh-Tsujii inversion algorithm over GF(2 m ). 66-77 - Thomas W. Cusick:
Highly nonlinear plateaued functions. 78-81 - Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen:
Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. 82-88 - Ting Cui, Chenhui Jin, Bin Zhang, Zhuo Chen, Guoshuang Zhang:
Searching all truncated impossible differentials in SPN. 89-96 - Rongjia Li, Chenhui Jin:
Improved meet-in-the-middle attacks on Crypton and mCrypton. 97-103 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. 104-113 - Md. Mokammel Haque, Josef Pieprzyk:
Analysing recursive preprocessing of BKZ lattice reduction algorithm. 114-120
Volume 11, Number 3, May 2017
- Lei Zhang, Wenling Wu:
Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. 121-128 - Huaqun Wang, Debiao He, Shibing Zhang:
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid. 131-138 - Zhen Ma, Tian Tian, Wen-Feng Qi:
Conditional differential attacks on Grain-128a stream cipher. 139-145 - Pawel Morawiecki:
Practical attacks on the round-reduced PRINCE. 146-151 - Zhenzhen Zhang, Jianjun Hou, Yu Zhang, Jingyu Ye, Yunqing Shi:
Detecting multiple H.264/AVC compressions with the same quantisation parameters. 152-158 - Harish Kumar Sahu, Indivar Gupta, N. Rajesh Pillai, Rajendra Kumar Sharma:
BDD-based cryptanalysis of stream cipher: a practical approach. 159-167 - Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li:
Directed proxy signature with fast revocation proven secure in the standard model. 168-176
Volume 11, Number 4, July 2017
- Sedat Akleylek, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk:
Efficient methods to generate cryptographically significant binary diffusion layers. 177-187 - Liran Lerman, Zdenek Martinasek, Olivier Markowitch:
Robust profiled attacks: should the adversary trust the dataset? 188-194 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:
Note on scalar multiplication using division polynomials. 195-198 - WeiGuo Zhang, Luyang Li, Enes Pasalic:
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity. 199-203 - Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. 204-210 - YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin:
Cheating prevention visual cryptography scheme using Latin square. 211-219 - Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo:
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'. 220-221
Volume 11, Number 5, September 2017
- Xianfang Wang, Fang-Wei Fu:
Multi-receiver authentication scheme with hierarchical structure. 223-229 - Dong Yang, Wen-Feng Qi, Tian Tian:
All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers. 230-234 - Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:
Dynamic authenticated data structures with access control for outsourcing data stream. 235-242 - Zheng Yang, Junyu Lai, Wanping Liu, Chao Liu, Song Luo:
SignORKE: improving pairing-based one-round key exchange without random oracles. 243-249 - Yi-Ning Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. 250-255 - Caixue Zhou, Zongmin Cui:
Certificate-based signature scheme in the standard model. 256-260 - Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie:
Constructions of involutions with optimal minimum degree. 261-266 - Santanu Sarkar:
Results on significant anomalies of state values after key scheduling algorithm in RC4. 267-272 - Lei Cheng, Chao Li:
Revisiting impossible differentials of MARS-like structures. 273-276 - Kai Fu, Ling Sun, Meiqin Wang:
New integral attacks on SIMON. 277-286 - Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata:
Computational SS and conversion protocols in both active and passive settings. 287-293 - Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Migrating from RBAC to temporal RBAC. 294-300
Volume 11, Number 6, November 2017
- Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh, Jeng-Shyang Pan:
Low-latency digit-serial dual basis multiplier for lightweight cryptosystems. 301-311 - Cuiping Shao, Huiyun Li, Jianbin Zhou:
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test. 312-318 - Li Yang, Wei Huang, Xinxin Niu:
Defending shilling attacks in recommender systems using soft co-clustering. 319-325 - Samaneh Mashhadi, Massoud Hadian Dehkordi, Niloofar Kiamari:
Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. 326-331 - Javier Herranz:
Attribute-based encryption implies identity-based encryption. 332-337 - Po-Hung Yang, Sung-Ming Yen:
Memory attestation of wireless sensor nodes through trusted remote agents. 338-344 - Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu:
MNOS: a mimic network operating system for software defined networks. 345-355 - Nikita Veshchikov, Sylvain Guilley:
Implementation flaws in the masking scheme of DPA Contest v4. 356-362 - Zhen Ma, Tian Tian, Wen-Feng Qi:
Internal state recovery of Grain v1 employing guess-and-determine attack. 363-368 - Wei Yang, Yadong Wan, Qin Wang:
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things. 369-376 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:
Impossible differential attacks on the SKINNY family of block ciphers. 377-385 - Ricardo Julio Rodríguez, Juan Carlos García-Escartín:
Security assessment of the Spanish contactless identity card. 386-393
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.