


default search action
IET Information Security, Volume 13
Volume 13, Number 1, 2019
- Qian Li, Rangding Wang, Dawen Xu

:
Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients. 1-6 - Nilesh Chakraborty, Samrat Mondal

:
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. 7-18 - Seyyedeh Atefeh Musavi

, Mahmoud Reza Hashemi:
HPCgnature: a hardware-based application-level intrusion detection system. 19-26 - Richard Rivera

, Platon Kotzias, Avinash Sudhodanan, Juan Caballero:
Costly freeware: a systematic analysis of abuse in download portals. 27-35 - Miodrag J. Mihaljevic, Frédérique E. Oggier:

Security evaluation and design elements for a class of randomised encryptions. 36-47 - Yang Jia, Meng Wang, Yagang Wang:

Network intrusion detection algorithm based on deep neural network. 48-53 - Bardiya Barari, Pedram Kheirkhah Sangdeh, Bahareh Akhbari:

Secure degrees of freedom of two-user X-channel with synergistic alternating channel state information at transmitters. 54-60 - Cheng Guo, Pengxu Tian, Chin-Chen Chang:

Privacy preserving weighted similarity search scheme for encrypted data. 61-69 - Rongjia Li, Chenhui Jin:

Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC. 70-75 - Hyungyu Lee, Changwoo Pyo, Gyungho Lee:

Dynamic reencryption of return addresses. 76-85
Volume 13, Number 2, 2019
- Wenying Zhang, Vincent Rijmen

:
Division cryptanalysis of block ciphers with a binary diffusion layer. 87-95 - Sadhana Jha, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. 96-103 - Huawang Qin, Raylin Tso, Yuewei Dai:

Quantum secret sharing by using Fourier transform on orbital angular momentum. 104-108 - Weijie Han

, Jingfeng Xue, Hui Yan:
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine. 109-116 - Yongzhuang Wei

, Fu Yao, Enes Pasalic, An Wang:
New second-order threshold implementation of AES. 117-124 - Yafei Zheng, Wenling Wu:

On the extension and security of key schedule of GOST. 125-132 - Aniket Bhadane

, Sunil B. Mane
:
Detecting lateral spear phishing attacks in organisations. 133-140 - Jun-Zhi Li, Jie Guan:

Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1. 141-148 - Rongrong Xi, Xiaochun Yun, Zhiyu Hao:

Framework for risk assessment in cyber situational awareness. 149-156 - Qiang Zhang, Jianzhong Qiao, Qingyang Meng:

Build a trusted storage system on a mobile phone. 157-166
Volume 13, Number 3, 2019
- Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu:

Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model. 167-173 - Fuzhi Zhang, Zhoujun Ling, Shilei Wang

:
Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours. 174-187 - Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu:

HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering. 188-200 - Somayeh Soltani

, Seyed Amin Hosseini Seno
, Hadi Sadoghi Yazdi:
Event reconstruction using temporal pattern of file system modification. 201-212 - Ghania Ait Abdelmalek, Rezki Ziani, Rabah Mokdad:

Security and fault tolerance evaluation of TMR-QDI circuits. 213-222 - Muhammad Sohail

, Liangmin Wang
, Shunrong Jiang, Samar Zaineldeen, Rana Umair Ashraf
:
Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic. 223-230 - Aashish Parihar

, Sangeeta Nakhate
:
Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem. 231-238 - Mikel Uriarte

, Jasone Astorga
, Eduardo Jacob
, Maider Huarte, Óscar López:
Impact assessment of policy expressiveness of an optimised access control model for smart sensors. 239-248 - Bekir Unlu

:
Base for algebraic cryptanalysis based on combined representation of S-box. 249-257 - Zhigang Zhang, Chaowen Chang, Zhimin Guo, PeiSheng Han:

Re-definable access control over outsourced data in cloud storage systems. 258-268 - Ahmet Ilhan Aysan, Fatih Sakiz

, Sevil Sen
:
Analysis of dynamic code updating in Android with security perspective. 269-277 - Maryam Sheikhi-Garjan, Mojtaba Bahramian, Christophe Doche

:
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem. 278-284 - Meng Yue, Zhijun Wu, Jingjie Wang:

Detecting LDoS attack bursts based on queue distribution. 285-292
Volume 13, Number 4, 2019
- Mehran Alidoost Nia

, Behnam Bahrak, Mehdi Kargahi, Benjamin Fabian:
Detecting new generations of threats using attribute-based attack graphs. 293-303 - Maamar Ouladj

, Phillipe Guillot, Farid Mokrane:
Chosen message strategy to improve the correlation power analysis. 304-310 - Samiran Bag

, Muhammad Ajmal Azad
, Feng Hao
:
PriVeto: a fully private two-round veto protocol. 311-320 - J. Anitha Ruth, H. Sirmathi, A. Meenakshi:

Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks. 321-329 - Xiaona Zhang, Li-Ping Wang, Jun Xu:

Certifying multi-power RSA. 330-335 - Mahnaz Noroozi

, Ziba Eslami:
Public key authenticated encryption with keyword search: revisited. 336-342 - Massoud Hadian Dehkordi, Hossein Oraei:

How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes. 343-351 - Ali Moradi Vartouni, Mohammad Teshnehlab, Saeed Sedighian Kashi

:
Leveraging deep neural networks for anomaly-based web application firewall. 352-361 - Marta Conde Pena, Raúl Durán Díaz, Jean-Charles Faugère, Luis Hernández Encinas

, Ludovic Perret:
Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme. 362-366 - Mingdong Tang, Quan Qian

:
Dynamic API call sequence visualisation for malware classification. 367-377 - Dhiman Saha

, Sourya Kakarla
, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. 378-388 - Yizhi Zhao

, Shiwei Xu, Hongmei Chi
:
Encrypted secure polar coding scheme for general two-way wiretap channel. 393-403 - Marco Baldi

, Franco Chiaraluce
, Joachim Rosenthal
, Paolo Santini
, Davide Schipani:
Security of generalised Reed-Solomon code-based cryptosystems. 404-410
Volume 13, Number 5, 2019
- Lin Jiao

, Yonglin Hao, Yongqiang Li:
Improved guess-and-determine attack on TRIVIUM. 411-419 - Jin-Yuan Wang

, Sheng-Hong Lin, Wei Cai, Jianxin Dai:
ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels. 420-425 - Yanwei Zhou, Bo Yang, Yi Mu, Tao Wang, Xin Wang:

Identity-based encryption resilient to continuous key leakage. 426-434 - Matej Zuzcak

, Petr Bujok
:
Causal analysis of attacks against honeypots based on properties of countries. 435-447 - Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk

:
S-boxes representation and efficiency of algebraic attack. 448-458 - Parvin Rastegari, Mohammad Dakhilalian

, Mehdi Berenjkoub, Willy Susilo
:
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model. 459-468 - Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:

New zero-sum distinguishers on full 24-round Keccak-f using the division property. 469-478 - Lingchen Li

, Wenling Wu, Lei Zhang, Yafei Zheng:
New method to describe the differential distribution table for large S-boxes in MILP and its application. 479-485 - Morteza Noferesti, Rasool Jalili:

Inline high-bandwidth network analysis using a robust stream clustering algorithm. 486-495 - David Nuñez, Isaac Agudo

, Javier López:
Escrowed decryption protocols for lawful interception of encrypted data. 498-507 - Bagher Bagherpour, Ali Zaghian, Mahdi Sajadieh

:
Sigma protocol for faster proof of simultaneous homomorphism relations. 508-514 - Tianfeng Sun, Bin Hu, Yang Yang:

Research on highly non-linear plateaued functions. 515-518
Volume 13, Number 6, 2019
- Zhouhang Cheng, Haichang Gao

, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei:
Image-based CAPTCHAs based on neural style transfer. 519-529 - Iman Vakilinia

, Shamik Sengupta:
Fair and private rewarding in a coalitional game of cybersecurity information sharing. 530-540 - Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia:

Dynamical model for individual defence against cyber epidemic attacks. 541-551 - Athmane Seghier, Jianxin Li, Dazhi Sun

:
Advanced encryption standard based on key dependent S-Box cube. 552-558 - Samir Hodzic, Enes Pasalic, Yongzhuang Wei:

Guess and determine cryptanalysis with variable sampling and its applications. 559-569 - Christoforos Ntantogian

, Georgios Poulios, Georgios Karopoulos, Christos Xenakis
:
Transforming malicious code to ROP gadgets for antivirus evasion. 570-578 - Huiqin Xie, Li Yang:

Witness indistinguishability and witness hiding against quantum attacks. 579-590 - Kakumani K. C. Deepthi, Kunwar Singh:

Cryptanalysis for reduced round Salsa and ChaCha: revisited. 591-602 - Deepak Kumar Dalai

, Subhamoy Maitra, Santu Pal
, Dibyendu Roy:
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs. 603-613 - SrinivasaRao SubramanyaRao, Zhi Hu, Chang-An Zhao

:
Division polynomial-based elliptic curve scalar multiplication revisited. 614-617 - Dario Fiore, Aikaterini Mitrokotsa

, Luca Nizzardo
, Elena Pagnin
:
Multi-key homomorphic authenticators. 618-638 - Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:

Fully homomorphic encryption based on the ring learning with rounding problem. 639-648 - Huidan Hu, Changlu Lin, Chin-Chen Chang, Lanxiang Chen:

Enhanced secure data backup scheme using multi-factor authentication. 649-658 - Waleed Ali

, Adel Ali Ahmed:
Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting. 659-669 - Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis

, Foteini Baldimtsi, George Stephanides:
Leakage-resilient lattice-based partially blind signatures. 670-684 - Yupu Hu, Shanshan Zhang

, Jiangshan Chen
, Baocang Wang:
Revisiting BGG+14 ABE with weakness analysis. 685-691 - Prathiba Ashok

, Kanchana Bhaaskaran Vettuvanam Somasundaram
:
Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks. 692-702 - Jikai Teng, Hongyang Ma

:
Dynamic asymmetric group key agreement protocol with traitor traceability. 703-710

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














