


default search action
IET Information Security, Volume 2024
Volume 2024, Number 1, 2024
- Jiamin Hu
, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng
, Fuqun Wang
, Yong Liu:
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT. - Haiyan Xiu
, Fang Ren
, Xinglong Xue, Dong Zheng:
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics. - Nobuyuki Sugio
:
Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming. - Vikas K. Soman
, V. Natarajan:
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud. - Ting Guo
, Abdugeni Abduxkur, Nurmamat Helil
:
Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation. - Lansheng Han
, Peng Chen, Wei Liao:
DCDroid: An APK Static Identification Method Based on Naïve Bayes Classifier and Dual-Centrality Analysis. - Bangli Wang, Yuxuan Jiang, You Liao, Zhen Li
:
DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer. - Syed Imran Akhtar
, Abdul Rauf
, Muhammad Faisal Amjad, Ifra Batool:
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls. - Fusheng Wu
, Jinhui Liu, Yanbin Li
, Mingtao Ni
:
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory. - Ruolin Zhang
, Zejun Xiang
, Shasha Zhang
, Xiangyong Zeng
, Min Song
:
Optimized SM4 Hardware Implementations for Low Area Consumption. - Shiping Cai
, Kaizhan Lin
, Chang-An Zhao
:
Pairing Optimizations for Isogeny-Based Cryptosystems. - Jinxia Li
, Liwei Lu:
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data. - Gao Wang, Gaoli Wang, Siwei Sun:
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis. - Cheng-Yi Lee
, Zi-Yuan Liu
, Masahiro Mambo
, Raylin Tso
:
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates. - Ying-Ti Tsai
, Chung-Ho Wang, Yung-Chia Chang
, Lee-Ing Tong:
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. - Chan Song
, Wenling Wu, Lei Zhang:
New Differential-Based Distinguishers for Ascon via Constraint Programming. - Adnan Kiliç
, Cansu Betin Onur
, Ertan Onur
:
PATS: Let Parties Have a Say in Threshold Group Key Sharing. - Yanxia Dui
, Hongchun Hu
:
Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms. - Yaxin Cui
, Hong Xu
, Lin Tan
, Wenfeng Qi
:
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS. - Yang Wang
, Mingqiang Wang
:
Improved AB-CPREs with Revocability and HRA Security under LWE. - Jing Wang
, Xue Yuan
, Yingjie Xu
, Yudi Zhang
:
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs. - Saranya N.
, Anandakumar Haldorai
:
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution. - Selvakumar Shanmugam
, Rajesh Natarajan
, H. L. Gururaj
, Francesco Flammini
, Badria Sulaiman Alfurhood
, Anitha Premkumar
:
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services. - Shaoxuan Zhang
, Chun Guo
, Qingju Wang:
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations. - Zheng Wu
, Lin Ding
, Zhengting Li
, Xinhai Wang
, Ziyu Guan
:
New Practical Attacks on GEA-1 Based on a New-Found Weakness. 1-12 - Momeng Liu
, Yupu Hu
, Qiqi Lai
, Shanshan Zhang
, Huiwen Jia
, Wen Gao
, Baocang Wang
:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. 1-16 - Bing Li
, Mingxuan Zheng
, Maode Ma
:
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking. 1-21 - Xiaohui Yang, Jing Liu
:
HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes. 1-14 - Lin Wang
, Yang Wang
, Huiwen Jia
:
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption. 1-20 - Wei Gu
, Hongyan Xing
, Tianhao Hou
:
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling. 1-12 - Bo Mei
, Zhengbin Zhu
, Peijie Li
, Bo Zhao
:
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer. 1-15 - Lei Zhao, Zhizhi Liu, Sixing Wu
, Wei Chen, Liwen Wu
, Bin Pu
, Shaowen Yao:
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent. 1-11 - Wenya Li
, Kai Zhang
, Bin Hu:
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers. 1-14 - Canling Wang, Wei Wu, Fulong Chen
, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao:
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing. 1-16 - Shiwei Chen
, Ting Cui
, Chenhui Jin
, Congjun Wang
:
A Second Preimage Attack on the XOR Hash Combiner. 1-7 - Bohan Wang
, Qian Sui, Fanjie Ji
, Chun Guo
, Weijia Wang
:
Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition. 1-16 - Jingyu Ning
, Zhenhua Tan
, Kaibing Zhang
, Weizhong Ye
:
Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets. 1-12 - Lin Wang
:
Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard. 1-17 - Yanyan Zhou
, Senpeng Wang
, Bin Hu:
MILP/MIQCP-Based Fully Automatic Method of Searching for Differential-Linear Distinguishers for SIMON-Like Ciphers. 1-39 - Botao Liu
, Ming Tang
:
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes. 1-17 - Xiansheng Cao
, Junfeng Wang
, Peng Wu
, Zhiyang Fang
:
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives. 1-15 - Guangqiu Lv
, Chenhui Jin
, Zhen Shi
, Ting Cui
:
Unveiling the Neutral Difference and Its Automated Search. 1-15 - Yixian Liu
, Yupeng Dai
:
Deep Learning in Cybersecurity: A Hybrid BERT-LSTM Network for SQL Injection Attack Detection. 1-16 - Lin Jiao
, Yongqiang Li, Yonglin Hao, Xinxin Gong:
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA. 1-11 - Armita Kazeminajafabadi
, Mahdi Imani
:
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach. 1-20 - Khatereh Ahmadi, Reza Javidan
:
A Trust Based Anomaly Detection Scheme Using a Hybrid Deep Learning Model for IoT Routing Attacks Mitigation. - Shaohua Ma, Zongqu Zhao
, Naifeng Wang, Chunming Zha
:
Lattice-Based CP-ABE for Optimal Broadcast Encryption With Polynomial-Depth Circuits. - Shalini Kumari
, Chander Prabha
, Asif Karim
, Md. Mehedi Hassan
, Sami Azam
:
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019-2023. - Pu Li, Muhua Liu
, Youlin Shang:
Functional Message Authentication Codes With Message and Function Privacy. - Dongmin Kim, Jieun Eom
, Kee Sung Kim
:
Full-Accessible Multiparty Searchable Encryption Scheme for Shared Cloud Storage.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
