:facetid:toc:\"db/journals/iet-ifs/iet-ifs12.bht\"
OK
:facetid:toc:db/journals/iet-ifs/iet-ifs12.bht
Golnar Assadat AfzaliShahriar MohammadiPrivacy preserving big data mining: association rule hiding using fuzzy logic approach.IET Inf. Secur.12115-242018Journal Articlesclosedjournals/iet-ifs/AfzaliM1810.1049/IET-IFS.2015.0545https://doi.org/10.1049/iet-ifs.2015.0545https://dblp.org/rec/journals/iet-ifs/AfzaliM18
URL#2411213
Maryam Rajabzadeh AsaarMohammad Hassan AmeriMahmoud SalmasizadehMohammad Reza ArefA provably secure code-based concurrent signature scheme.IET Inf. Secur.12134-412018Journal Articlesclosedjournals/iet-ifs/AsaarASA1810.1049/IET-IFS.2017.0023https://doi.org/10.1049/iet-ifs.2017.0023https://dblp.org/rec/journals/iet-ifs/AsaarASA18
URL#2411214
Kunpeng BaiChuankun WuZhenfeng ZhangProtect white-box AES to resist table composition attacks.IET Inf. Secur.124305-3132018Journal Articlesclosedjournals/iet-ifs/BaiWZ1810.1049/IET-IFS.2017.0046https://doi.org/10.1049/iet-ifs.2017.0046https://dblp.org/rec/journals/iet-ifs/BaiWZ18
URL#2411215
William J. BuchananScott HelmeAlan WoodwardAnalysis of the adoption of security headers in HTTP.IET Inf. Secur.122118-1262018Journal Articlesclosedjournals/iet-ifs/BuchananHW1810.1049/IET-IFS.2016.0621https://doi.org/10.1049/iet-ifs.2016.0621https://dblp.org/rec/journals/iet-ifs/BuchananHW18
URL#2411216
Özgü CanPersonalised anonymity for microdata release.IET Inf. Secur.124341-3472018Journal Articlesclosedjournals/iet-ifs/Can1810.1049/IET-IFS.2016.0613https://doi.org/10.1049/iet-ifs.2016.0613https://dblp.org/rec/journals/iet-ifs/Can18
URL#2411217
Sébastien CanardDuong Hieu PhanViet Cuong TrinhAttribute-based broadcast encryption scheme for lightweight devices.IET Inf. Secur.12152-592018Journal Articlesclosedjournals/iet-ifs/CanardPT1810.1049/IET-IFS.2017.0157https://doi.org/10.1049/iet-ifs.2017.0157https://dblp.org/rec/journals/iet-ifs/CanardPT18
URL#2411218
Angelo De CaroVincenzo IovinoAdam O'NeillReceiver- and sender-deniable functional encryption.IET Inf. Secur.123207-2162018Journal Articlesclosedjournals/iet-ifs/CaroIO1810.1049/IET-IFS.2017.0040https://doi.org/10.1049/iet-ifs.2017.0040https://dblp.org/rec/journals/iet-ifs/CaroIO18
URL#2411219
Zhixiong Chen 0002Linear complexity of Legendre-polynomial quotients.IET Inf. Secur.125414-4182018Journal Articlesclosedjournals/iet-ifs/Chen1810.1049/IET-IFS.2017.0307https://doi.org/10.1049/iet-ifs.2017.0307https://dblp.org/rec/journals/iet-ifs/Chen18
URL#2411220
Tao Chen 0043Michael FarcasinEric Chan-TinSmartphone passcode prediction.IET Inf. Secur.125431-4372018Journal Articlesclosedjournals/iet-ifs/ChenFC1810.1049/IET-IFS.2017.0606https://doi.org/10.1049/iet-ifs.2017.0606https://dblp.org/rec/journals/iet-ifs/ChenFC18
URL#2411221
Zhihui ChuHuaifeng ChenXiaoyun Wang 0001Lu Li 0006Xiaoyang DongYaoling DingYonglin HaoImproved integral attacks without full codebook.IET Inf. Secur.126513-5202018Journal Articlesclosedjournals/iet-ifs/ChuCWLDDH1810.1049/IET-IFS.2017.0388https://doi.org/10.1049/iet-ifs.2017.0388https://dblp.org/rec/journals/iet-ifs/ChuCWLDDH18
URL#2411222
Tzuo-Yau FanHer-Chang ChaoUser-friendly XOR-based visual secret sharing by random grid.IET Inf. Secur.125398-4032018Journal Articlesclosedjournals/iet-ifs/FanC1810.1049/IET-IFS.2017.0546https://doi.org/10.1049/iet-ifs.2017.0546https://dblp.org/rec/journals/iet-ifs/FanC18
URL#2411223
Nils FleischhackerJohannes KruppGiulio MalavoltaJonas Schneider 0001Dominique SchröderMark Simkin 0001Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys.IET Inf. Secur.123166-1832018Journal Articlesclosedjournals/iet-ifs/FleischhackerKM1810.1049/IET-IFS.2017.0041https://doi.org/10.1049/iet-ifs.2017.0041https://dblp.org/rec/journals/iet-ifs/FleischhackerKM18
URL#2411224
Amor GueddanaVasudevan LakshminarayananPhysical feasibility of QKD based on probabilistic quantum circuits.IET Inf. Secur.126521-5262018Journal Articlesclosedjournals/iet-ifs/GueddanaL1810.1049/IET-IFS.2017.0375https://doi.org/10.1049/iet-ifs.2017.0375https://dblp.org/rec/journals/iet-ifs/GueddanaL18
URL#2411225
Yaojun HaoFuzhi ZhangDetecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features.IET Inf. Secur.124362-3742018Journal Articlesclosedjournals/iet-ifs/HaoZ1810.1049/IET-IFS.2017.0012https://doi.org/10.1049/iet-ifs.2017.0012https://dblp.org/rec/journals/iet-ifs/HaoZ18
URL#2411226
Md. Mokammel HaqueJosef PieprzykPreprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm.IET Inf. Secur.126551-5572018Journal Articlesclosedjournals/iet-ifs/HaqueP1810.1049/IET-IFS.2017.0400https://doi.org/10.1049/iet-ifs.2017.0400https://dblp.org/rec/journals/iet-ifs/HaqueP18
URL#2411227
Emad S. HassanAmir Salah ElsafraweyMoawad I. DessoukyTrade-off between self-healing and energy consumption in mobile unattended WSNs.IET Inf. Secur.124285-2922018Journal Articlesclosedjournals/iet-ifs/HassanED1810.1049/IET-IFS.2017.0369https://doi.org/10.1049/iet-ifs.2017.0369https://dblp.org/rec/journals/iet-ifs/HassanED18
URL#2411228
ThienLuan HoSeong-Je ChoSeungrohk OhParallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units.IET Inf. Secur.124381-3882018Journal Articlesclosedjournals/iet-ifs/HoCO1810.1049/IET-IFS.2017.0421https://doi.org/10.1049/iet-ifs.2017.0421https://dblp.org/rec/journals/iet-ifs/HoCO18
URL#2411229
Hongchao HuJiangxing WuZhenpeng WangGuozhen ChengMimic defense: a designed-in cybersecurity defense framework.IET Inf. Secur.123226-2372018Journal Articlesclosedjournals/iet-ifs/HuWWC1810.1049/IET-IFS.2017.0086https://doi.org/10.1049/iet-ifs.2017.0086https://dblp.org/rec/journals/iet-ifs/HuWWC18
URL#2411230
Mingxing HuQing YeYongli TangEfficient batch identity-based fully homomorphic encryption scheme in the standard model.IET Inf. Secur.126475-4832018Journal Articlesclosedjournals/iet-ifs/HuYT1810.1049/IET-IFS.2017.0567https://doi.org/10.1049/iet-ifs.2017.0567https://dblp.org/rec/journals/iet-ifs/HuYT18
URL#2411231
Vincenzo IovinoQiang Tang 0001Karol ZebrowskiPower of public-key function-private functional encryption.IET Inf. Secur.124248-2562018Journal Articlesclosedjournals/iet-ifs/IovinoTZ1810.1049/IET-IFS.2016.0459https://doi.org/10.1049/iet-ifs.2016.0459https://dblp.org/rec/journals/iet-ifs/IovinoTZ18
URL#2411232
Shaoquan JiangJue LiYongjian LiaoEfficient approximate message authentication scheme.IET Inf. Secur.121100-1062018Journal Articlesclosedjournals/iet-ifs/JiangLL1810.1049/IET-IFS.2016.0256https://doi.org/10.1049/iet-ifs.2016.0256https://dblp.org/rec/journals/iet-ifs/JiangLL18
URL#2411233
Lin JiaoYongqiang Li 0001Yonglin HaoGuess-and-determine attacks on PANAMA-like stream ciphers.IET Inf. Secur.126484-4972018Journal Articlesclosedjournals/iet-ifs/JiaoLH1810.1049/IET-IFS.2017.0553https://doi.org/10.1049/iet-ifs.2017.0553https://dblp.org/rec/journals/iet-ifs/JiaoLH18
URL#2411234
KamaldeepManisha MalikMaitreyee DuttaImplementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks.IET Inf. Secur.1211-62018Journal Articlesclosedjournals/iet-ifs/KamaldeepMD1810.1049/IET-IFS.2015.0483https://doi.org/10.1049/iet-ifs.2015.0483https://dblp.org/rec/journals/iet-ifs/KamaldeepMD18
URL#2411235
Mina Sadat KhazaeiHossein HomaeiHamid Reza ShahriariOPEXA: analyser assistant for detecting over-privileged extensions.IET Inf. Secur.126558-5652018Journal Articlesclosedjournals/iet-ifs/KhazaeiHS1810.1049/IET-IFS.2017.0652https://doi.org/10.1049/iet-ifs.2017.0652https://dblp.org/rec/journals/iet-ifs/KhazaeiHS18
URL#2411236
Eunkyung Kim 0002Mehdi TibouchiFHE over the integers and modular arithmetic circuits.IET Inf. Secur.124257-2642018Journal Articlesclosedjournals/iet-ifs/KimT1810.1049/IET-IFS.2017.0024https://doi.org/10.1049/iet-ifs.2017.0024https://dblp.org/rec/journals/iet-ifs/KimT18
URL#2411237
Frédéric LafitteCryptoSAT: a tool for SAT-based cryptanalysis.IET Inf. Secur.126463-4742018Journal Articlesclosedjournals/iet-ifs/Lafitte1810.1049/IET-IFS.2017.0176https://doi.org/10.1049/iet-ifs.2017.0176https://dblp.org/rec/journals/iet-ifs/Lafitte18
URL#2411238
Jiayang LiuJingguo BiEquivalent key attack against a public-key cryptosystem based on subset sum problem.IET Inf. Secur.126498-5012018Journal Articlesclosedjournals/iet-ifs/LiuB1810.1049/IET-IFS.2018.0041https://doi.org/10.1049/iet-ifs.2018.0041https://dblp.org/rec/journals/iet-ifs/LiuB18
URL#2411239
Jiqiang LuWun-She YapYongzhuang WeiWeak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis.IET Inf. Secur.125389-3972018Journal Articlesclosedjournals/iet-ifs/LuYW1810.1049/IET-IFS.2017.0173https://doi.org/10.1049/iet-ifs.2017.0173https://dblp.org/rec/journals/iet-ifs/LuYW18
URL#2411240
Junjie LvJuling RongVirtualisation security risk assessment for enterprise cloud services based on stochastic game nets model.IET Inf. Secur.1217-142018Journal Articlesclosedjournals/iet-ifs/LvR1810.1049/IET-IFS.2017.0038https://doi.org/10.1049/iet-ifs.2017.0038https://dblp.org/rec/journals/iet-ifs/LvR18
URL#2411241
Hridoy Jyoti MahantaAjoy Kumar KhanSecuring RSA against power analysis attacks through non-uniform exponent partitioning with randomisation.IET Inf. Secur.12125-332018Journal Articlesclosedjournals/iet-ifs/MahantaK1810.1049/IET-IFS.2016.0508https://doi.org/10.1049/iet-ifs.2016.0508https://dblp.org/rec/journals/iet-ifs/MahantaK18
URL#2411242
Sebastian Meiser 0001Dominique SchröderDelegatable functional signatures.IET Inf. Secur.123194-2062018Journal Articlesclosedjournals/iet-ifs/MeiserS1810.1049/IET-IFS.2017.0082https://doi.org/10.1049/iet-ifs.2017.0082https://dblp.org/rec/journals/iet-ifs/MeiserS18
URL#2411243
Menaga DevendranRevathi SathyaLeast lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding.IET Inf. Secur.124332-3402018Journal Articlesclosedjournals/iet-ifs/MenagaR1810.1049/IET-IFS.2017.0634https://doi.org/10.1049/iet-ifs.2017.0634https://dblp.org/rec/journals/iet-ifs/MenagaR18
URL#2411244
Yusuke Naito 0001Sandwich construction for keyed sponges: independence between capacity and construction queries.IET Inf. Secur.124265-2742018Journal Articlesclosedjournals/iet-ifs/Naito1810.1049/IET-IFS.2017.0027https://doi.org/10.1049/iet-ifs.2017.0027https://dblp.org/rec/journals/iet-ifs/Naito18
URL#2411245
Samuel NevesMehdi TibouchiDegenerate curve attacks: extending invalid curve attacks to Edwards curves and other models.IET Inf. Secur.123217-2252018Journal Articlesclosedjournals/iet-ifs/NevesT1810.1049/IET-IFS.2017.0075https://doi.org/10.1049/iet-ifs.2017.0075https://dblp.org/rec/journals/iet-ifs/NevesT18
URL#2411246
Meltem Kurt PehlIvanoõluMuharrem Tolga SakalliSedat AkleylekNevcihan DuruVincent RijmenGeneralisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography.IET Inf. Secur.124348-3552018Journal Articlesclosedjournals/iet-ifs/PehlivanogluSAD1810.1049/IET-IFS.2017.0156https://doi.org/10.1049/iet-ifs.2017.0156https://dblp.org/rec/journals/iet-ifs/PehlivanogluSAD18
URL#2411247
Abdurrahman PektasTankut AcarmanMalware classification based on API calls and behaviour analysis.IET Inf. Secur.122107-1172018Journal Articlesclosedjournals/iet-ifs/PektasA1810.1049/IET-IFS.2017.0430https://doi.org/10.1049/iet-ifs.2017.0430https://dblp.org/rec/journals/iet-ifs/PektasA18
URL#2411248
Yuan PingBaocang WangShengli TianYuehua YangGenyuan DuDeterministic lattice reduction on knapsacks with collision-free properties.IET Inf. Secur.124375-3802018Journal Articlesclosedjournals/iet-ifs/PingWTYD1810.1049/IET-IFS.2017.0107https://doi.org/10.1049/iet-ifs.2017.0107https://dblp.org/rec/journals/iet-ifs/PingWTYD18
URL#2411249
Deepak RewadkarDharmapal Dronacharya DoyeMulti-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET.IET Inf. Secur.124293-3042018Journal Articlesclosedjournals/iet-ifs/RewadkarD1810.1049/IET-IFS.2018.0002https://doi.org/10.1049/iet-ifs.2018.0002https://dblp.org/rec/journals/iet-ifs/RewadkarD18
URL#2411250
Sadegh SadeghiNasour BagheriImproved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher.IET Inf. Secur.124314-3252018Journal Articlesclosedjournals/iet-ifs/SadeghiB1810.1049/IET-IFS.2016.0590https://doi.org/10.1049/iet-ifs.2016.0590https://dblp.org/rec/journals/iet-ifs/SadeghiB18
URL#2411251
Nader Sohrabi SafaCarsten MapleTim WatsonSteven FurnellInformation security collaboration formation in organisations.IET Inf. Secur.123238-2452018Journal Articlesclosedjournals/iet-ifs/SafaMWF1810.1049/IET-IFS.2017.0257https://doi.org/10.1049/iet-ifs.2017.0257https://dblp.org/rec/journals/iet-ifs/SafaMWF18
URL#2411252
Yusuke Sakai 0001Nuttapong AttrapadungGoichiro HanaokaPractical attribute-based signature schemes for circuits from bilinear map.IET Inf. Secur.123184-1932018Journal Articlesclosedjournals/iet-ifs/SakaiAH1810.1049/IET-IFS.2017.0029https://doi.org/10.1049/iet-ifs.2017.0029https://dblp.org/rec/journals/iet-ifs/SakaiAH18
URL#2411253
Sergio de los SantosJosé TorresAnalysing HSTS and HPKP implementation in both browsers and servers.IET Inf. Secur.124275-2842018Journal Articlesclosedjournals/iet-ifs/SantosT1810.1049/IET-IFS.2017.0030https://doi.org/10.1049/iet-ifs.2017.0030https://dblp.org/rec/journals/iet-ifs/SantosT18
URL#2411254
Hassan SeifiSaeed ParsaMining malicious behavioural patterns.IET Inf. Secur.12160-702018Journal Articlesclosedjournals/iet-ifs/SeifiP1810.1049/IET-IFS.2017.0079https://doi.org/10.1049/iet-ifs.2017.0079https://dblp.org/rec/journals/iet-ifs/SeifiP18
URL#2411255
Jianxiong ShaoYu QinDengguo FengFormal analysis of HMAC authorisation in the TPM2.0 specification.IET Inf. Secur.122133-1402018Journal Articlesclosedjournals/iet-ifs/ShaoQF1810.1049/IET-IFS.2016.0005https://doi.org/10.1049/iet-ifs.2016.0005https://dblp.org/rec/journals/iet-ifs/ShaoQF18
URL#2411256
Khundrakpam Johnson SinghKhelchandra ThongamTanmay DeDetection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation.IET Inf. Secur.126502-5122018Journal Articlesclosedjournals/iet-ifs/SinghKD1810.1049/IET-IFS.2017.0500https://doi.org/10.1049/iet-ifs.2017.0500https://dblp.org/rec/journals/iet-ifs/SinghKD18
URL#2411257
Guillermo Suarez-TangilSantanu Kumar Dash 0001Pedro García-TeodoroJosé Camacho 0001Lorenzo CavallaroAnomaly-based exploratory analysis and detection of exploits in android mediaserver.IET Inf. Secur.125404-4132018Journal Articlesclosedjournals/iet-ifs/Suarez-TangilDG1810.1049/IET-IFS.2017.0460https://doi.org/10.1049/iet-ifs.2017.0460https://dblp.org/rec/journals/iet-ifs/Suarez-TangilDG18
URL#2411258
Mohammad TaherifardAhmad PatooghyMahdi FazeliVulnerability modelling of crypto-chips against scan-based attacks.IET Inf. Secur.126543-5502018Journal Articlesclosedjournals/iet-ifs/TaherifardPF1810.1049/IET-IFS.2017.0440https://doi.org/10.1049/iet-ifs.2017.0440https://dblp.org/rec/journals/iet-ifs/TaherifardPF18
URL#2411259
Yongkang TangShaoqing LiFan ZhangLiang FangThermal maps based HT detection using spatial projection transformation.IET Inf. Secur.124356-3612018Journal Articlesclosedjournals/iet-ifs/TangLZF1810.1049/IET-IFS.2017.0354https://doi.org/10.1049/iet-ifs.2017.0354https://dblp.org/rec/journals/iet-ifs/TangLZF18
URL#2411260
María Isabel González VascoAngel L. Pérez del PozoAdriana Suárez CoronaGroup key exchange protocols withstanding ephemeral-key reveals.IET Inf. Secur.12179-862018Journal Articlesclosedjournals/iet-ifs/VascoPC1810.1049/IET-IFS.2017.0131https://doi.org/10.1049/iet-ifs.2017.0131https://dblp.org/rec/journals/iet-ifs/VascoPC18
URL#2411261
Girraj Kumar VermaB. B. SinghEfficient identity-based blind message recovery signature scheme from pairings.IET Inf. Secur.122150-1562018Journal Articlesclosedjournals/iet-ifs/VermaS1810.1049/IET-IFS.2017.0342https://doi.org/10.1049/iet-ifs.2017.0342https://dblp.org/rec/journals/iet-ifs/VermaS18
URL#2411262
Xiaonan Wang 0001Zhengxiong DouYi Mu 0001CCN framework with privacy support.IET Inf. Secur.122157-1642018Journal Articlesclosedjournals/iet-ifs/WangDM1810.1049/IET-IFS.2017.0390https://doi.org/10.1049/iet-ifs.2017.0390https://dblp.org/rec/journals/iet-ifs/WangDM18
URL#2411263
Dan WangBing GuoYan ShenMethod for measuring the privacy level of pre-published dataset.IET Inf. Secur.125425-4302018Journal Articlesclosedjournals/iet-ifs/WangGS1810.1049/IET-IFS.2017.0341https://doi.org/10.1049/iet-ifs.2017.0341https://dblp.org/rec/journals/iet-ifs/WangGS18
URL#2411264
Tongxiang WangTao LiangJianhua FanXianglin WeiSequential opening multi-jammers localisation in multi-hop wireless network.IET Inf. Secur.125445-4542018Journal Articlesclosedjournals/iet-ifs/WangLFW1810.1049/IET-IFS.2017.0346https://doi.org/10.1049/iet-ifs.2017.0346https://dblp.org/rec/journals/iet-ifs/WangLFW18
URL#2411265
Shangping WangXia ZhangYaling ZhangEfficient revocable and grantable attribute-based encryption from lattices with fine-grained access control.IET Inf. Secur.122141-1492018Journal Articlesclosedjournals/iet-ifs/WangZZ1810.1049/IET-IFS.2017.0225https://doi.org/10.1049/iet-ifs.2017.0225https://dblp.org/rec/journals/iet-ifs/WangZZ18
URL#2411266
Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference.IET Inf. Secur.1231652018Journal Articlesclosedjournals/iet-ifs/X1810.1049/IET-IFS.2018.0043https://doi.org/10.1049/iet-ifs.2018.0043https://dblp.org/rec/journals/iet-ifs/X18
URL#2411267
Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016).IET Inf. Secur.1242472018Journal Articlesclosedjournals/iet-ifs/X18a10.1049/IET-IFS.2018.0049https://doi.org/10.1049/iet-ifs.2018.0049https://dblp.org/rec/journals/iet-ifs/X18a
URL#2411268
Zhe XiaZheng TongMin XiaoChin-Chen Chang 0001Framework for practical and receipt-free remote voting.IET Inf. Secur.124326-3312018Journal Articlesclosedjournals/iet-ifs/XiaTXC1810.1049/IET-IFS.2017.0213https://doi.org/10.1049/iet-ifs.2017.0213https://dblp.org/rec/journals/iet-ifs/XiaTXC18
URL#2411269
Shijun XiangJiayong HeDatabase authentication watermarking scheme in encrypted domain.IET Inf. Secur.12142-512018Journal Articlesclosedjournals/iet-ifs/XiangH1810.1049/IET-IFS.2017.0092https://doi.org/10.1049/iet-ifs.2017.0092https://dblp.org/rec/journals/iet-ifs/XiangH18
URL#2411270
Guangliang XuWei Yang 0011Liusheng HuangSupervised learning framework for covert channel detection in LTE-A.IET Inf. Secur.126534-5422018Journal Articlesclosedjournals/iet-ifs/XuYH1810.1049/IET-IFS.2017.0394https://doi.org/10.1049/iet-ifs.2017.0394https://dblp.org/rec/journals/iet-ifs/XuYH18
URL#2411271
Shuaijianni XuLiang Feng ZhangCryptanalysis of Morillo-Obrador polynomial delegation schemes.IET Inf. Secur.122127-1322018Journal Articlesclosedjournals/iet-ifs/XuZ1810.1049/IET-IFS.2017.0259https://doi.org/10.1049/iet-ifs.2017.0259https://dblp.org/rec/journals/iet-ifs/XuZ18
URL#2411272
Zheng Yang 0001Junyu LaiGuoyuan LiCryptanalysis of a generic one-round key exchange protocol with strong security.IET Inf. Secur.12171-782018Journal Articlesclosedjournals/iet-ifs/YangLL1810.1049/IET-IFS.2017.0055https://doi.org/10.1049/iet-ifs.2017.0055https://dblp.org/rec/journals/iet-ifs/YangLL18
URL#2411273
Dong YangWen-Feng Qi 0001Hua-Jin ChenObservations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0.IET Inf. Secur.125419-4242018Journal Articlesclosedjournals/iet-ifs/YangQC1810.1049/IET-IFS.2017.0196https://doi.org/10.1049/iet-ifs.2017.0196https://dblp.org/rec/journals/iet-ifs/YangQC18
URL#2411274
Penglin YangLimin TaoHaitao WangRTTV: a dynamic CFI measurement tool based on TPM.IET Inf. Secur.125438-4442018Journal Articlesclosedjournals/iet-ifs/YangTW1810.1049/IET-IFS.2017.0459https://doi.org/10.1049/iet-ifs.2017.0459https://dblp.org/rec/journals/iet-ifs/YangTW18
URL#2411275
Emre YüceAli Aydin SelçukServer notaries: a complementary approach to the web PKI trust model.IET Inf. Secur.125455-4612018Journal Articlesclosedjournals/iet-ifs/YuceS1810.1049/IET-IFS.2016.0611https://doi.org/10.1049/iet-ifs.2016.0611https://dblp.org/rec/journals/iet-ifs/YuceS18
URL#2411276
Kai Zhang 0026Jie GuanBin Hu 0011Dongdai LinSecurity evaluation on Simeck against zero-correlation linear cryptanalysis.IET Inf. Secur.12187-932018Journal Articlesclosedjournals/iet-ifs/ZhangGHL1810.1049/IET-IFS.2016.0503https://doi.org/10.1049/iet-ifs.2016.0503https://dblp.org/rec/journals/iet-ifs/ZhangGHL18
URL#2411277
En ZhangJie PengMing Li 0029Outsourcing secret sharing scheme based on homomorphism encryption.IET Inf. Secur.12194-992018Journal Articlesclosedjournals/iet-ifs/ZhangPL1810.1049/IET-IFS.2017.0026https://doi.org/10.1049/iet-ifs.2017.0026https://dblp.org/rec/journals/iet-ifs/ZhangPL18
URL#2411278
Jian ZouLe DongWenling WuNew algorithms for the unbalanced generalised birthday problem.IET Inf. Secur.126527-5332018Journal Articlesclosedjournals/iet-ifs/ZouDW1810.1049/IET-IFS.2017.0495https://doi.org/10.1049/iet-ifs.2017.0495https://dblp.org/rec/journals/iet-ifs/ZouDW18
URL#2411279