default search action
IET Information Security, Volume 9
Volume 9, Number 1, January 2015
- Wei He, Shivam Bhasin, Andrés Otero, Tarik Graba, Eduardo de la Torre, Jean-Luc Danger:
Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis. 1-13 - R. Pushpa Lakshmi, A. Vincent Antony Kumar:
Parallel key management scheme for mobile ad hoc network based on traffic mining. 14-23 - Fuzhi Zhang, Quanqiang Zhou:
Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network. 24-31 - Baodong Qin, Shengli Liu, Kefei Chen:
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. 32-42 - Hui Cui, Yi Mu, Man Ho Au:
Proof of retrievability with public verifiability resilient against related-key attacks. 43-49 - Alawi A. Al-Saggaf, Lahouari Ghouti:
Efficient abuse-free fair contract-signing protocol based on an ordinary crisp commitment scheme. 50-58 - Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu:
Transferable conditional e-cash with optimal anonymity in the standard model. 59-72 - Fatemeh Raji, Mohammad Davarpanah Jazi, Ali Miri:
PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability. 73-80 - Rafal Leszczyna:
Approaching secure industrial control systems. 81-89
Volume 9, Number 2, March 2015
- Dionysis Kefallinos, Efstathios D. Sykas:
'A public key infrastructure model for privacy-enhancing general purpose eIDs'. 91-99 - Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun:
Novel and practical scheme based on secret sharing for laptop data protection. 100-107 - Huaqun Wang:
Anonymous multi-receiver remote data retrieval for pay-TV in public clouds. 108-118 - S. Maria Celestin Vigila, K. Muneeswaran, W. T. B. A. Antony:
Biometric security system over finite field for mobile applications. 119-126 - Hong Xu, Yonghui Zheng, Xuejia Lai:
Construction of perfect diffusion layers from linear feedback shift registers. 127-135 - Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao:
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. 136-147
Volume 9, Number 3, May 2015
- Kwangsu Lee, Dong Hoon Lee:
Adaptively secure broadcast encryption under standard assumptions with better efficiency. 149-157 - Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng:
Efficient revocable certificateless encryption against decryption key exposure. 158-166 - Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. 167-178 - Hadi Soleimany:
Self-similarity cryptanalysis of the block cipher ITUbee. 179-184 - Zuhua Shao, Yipeng Gao:
Practical verifiably encrypted signature based on Waters signatures. 185-193 - Liaojun Pang, Lu Gao, Huixian Li, Yumin Wang:
Anonymous multi-receiver ID-based signcryption scheme. 194-201
Volume 9, Number 4, July 2015
- Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Hijacking the Vuze BitTorrent network: all your hop are belong to us. 203-208 - Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun:
Differential fault analysis on LED using Super-Sbox. 209-218 - Weijia Xue, Xuejia Lai:
Impossible differential cryptanalysis of MARS-like structures. 219-222 - Amir Salah Elsafrawey, Emad S. Hassan, Moawad I. Dessouky:
Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks. 223-233 - Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi:
Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps. 234-239 - Keshnee Padayachee:
Aspectising honeytokens to contain the insider threat. 240-247 - Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami:
Distributed key generation protocol with hierarchical threshold access structure. 248-255
Volume 9, Number 5, September 2015
- Fuzhi Zhang, Shuangxia Sun, Huawei Yi:
Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator. 257-265 - Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu:
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192. 266-276 - Le Dong, Yanling Wang, Wenling Wu, Jian Zou:
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. 277-283 - Myong-Son Sin, Ryul Kim:
Some new results on equivalency of collusion-secure properties for Reed-Solomon codes. 284-287 - Zhuohua Liu, Chuankun Wu:
Privacy of a randomised skip lists-based protocol. 288-293 - Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Biclique cryptanalysis of the full-round KLEIN block cipher. 294-301
Volume 9, Number 6, November 2015
- Khaled Salah, Aslam Chaudary:
Modelling and analysis of rule-based network security middleboxes. 305-312 - Suleiman Y. Yerima, Sakir Sezer, Igor Muttik:
High accuracy android malware detection using ensemble learning. 313-320 - Zhenqing Shi, Bin Zhang, Dengguo Feng:
Practical-time related-key attack on Hummingbird-2. 321-327 - Riham AlTawy, Amr M. Youssef:
Watch your constants: malicious Streebog. 328-333 - Walid I. Khedr, Mahmoud I. Abdalla, Asmaa A. Elsheikh:
Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network. 334-343 - Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu:
Exploring risk flow attack graph for security risk assessment. 344-353 - Gaoli Wang, Hongbo Yu:
Improved cryptanalysis on RIPEMD-128. 354-364 - Ali Al-Haj, Gheith A. Abandah, Noor Hussein:
Crypto-based algorithms for secured medical image transmission. 365-373 - Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault:
Constructing important features from massive network traffic for lightweight intrusion detection. 374-379 - Lin Cheng, Qiaoyan Wen:
Cryptanalysis and improvement of a certificateless partially blind signature. 380-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.