


default search action
IET Information Security, Volume 11
Volume 11, Number 1, January 2017
- Hasan Taha, Emad Alsusa

:
Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing. 1-7 - Xi Xiao, Zhenlong Wang, Qing Li

, Shu-Tao Xia, Yong Jiang:
Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences. 8-15 - Muhammad Nasir Mumtaz Bhutta

, Haitham S. Cruickshank, Zhili Sun
:
Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. 16-22 - Y. Sreenivasa Rao

:
Signature-policy attribute-based key-insulated signature. 23-33 - Moon Sung Lee:

Sparse subset sum problem from Gentry-Halevi's fully homomorphic encryption. 34-37 - Wenjun Fan

, David Fernández
, Zhihui Du
:
Versatile virtual honeynet management framework. 38-45 - Zhen Ma

, Tian Tian, Wen-Feng Qi:
Improved conditional differential attacks on Grain v1. 46-53
Volume 11, Number 2, March 2017
- Xiangling Ding

, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun:
Design of new scan orders for perceptual encryption of H.264/AVC videos. 55-65 - Bahram Rashidi, Reza Rezaeian Farashahi

, Sayed Masoud Sayedi:
High-performance and high-speed implementation of polynomial basis Itoh-Tsujii inversion algorithm over GF(2 m ). 66-77 - Thomas W. Cusick:

Highly nonlinear plateaued functions. 78-81 - Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen:

Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. 82-88 - Ting Cui, Chenhui Jin, Bin Zhang, Zhuo Chen, Guoshuang Zhang:

Searching all truncated impossible differentials in SPN. 89-96 - Rongjia Li, Chenhui Jin:

Improved meet-in-the-middle attacks on Crypton and mCrypton. 97-103 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:

Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. 104-113 - Md. Mokammel Haque

, Josef Pieprzyk
:
Analysing recursive preprocessing of BKZ lattice reduction algorithm. 114-120
Volume 11, Number 3, May 2017
- Lei Zhang, Wenling Wu:

Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function. 121-128 - Huaqun Wang, Debiao He, Shibing Zhang:

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid. 131-138 - Zhen Ma

, Tian Tian, Wen-Feng Qi:
Conditional differential attacks on Grain-128a stream cipher. 139-145 - Pawel Morawiecki

:
Practical attacks on the round-reduced PRINCE. 146-151 - Zhenzhen Zhang, Jianjun Hou, Yu Zhang, Jingyu Ye

, Yunqing Shi:
Detecting multiple H.264/AVC compressions with the same quantisation parameters. 152-158 - Harish Kumar Sahu, Indivar Gupta, N. Rajesh Pillai, Rajendra Kumar Sharma

:
BDD-based cryptanalysis of stream cipher: a practical approach. 159-167 - Liaojun Pang

, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li:
Directed proxy signature with fast revocation proven secure in the standard model. 168-176
Volume 11, Number 4, July 2017
- Sedat Akleylek

, Vincent Rijmen
, Muharrem Tolga Sakalli, Emir Öztürk
:
Efficient methods to generate cryptographically significant binary diffusion layers. 177-187 - Liran Lerman, Zdenek Martinasek

, Olivier Markowitch:
Robust profiled attacks: should the adversary trust the dataset? 188-194 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao

:
Note on scalar multiplication using division polynomials. 195-198 - WeiGuo Zhang

, Luyang Li, Enes Pasalic
:
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity. 199-203 - Liqun Chen

, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. 204-210 - YaWei Ren, Feng Liu

, Teng Guo, Rongquan Feng, Dongdai Lin:
Cheating prevention visual cryptography scheme using Latin square. 211-219 - Goutham Reddy Alavalapati

, Eun-Jun Yoon, Kee-Young Yoo:
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'. 220-221
Volume 11, Number 5, September 2017
- Xianfang Wang, Fang-Wei Fu:

Multi-receiver authentication scheme with hierarchical structure. 223-229 - Dong Yang, Wen-Feng Qi, Tian Tian:

All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers. 230-234 - Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu:

Dynamic authenticated data structures with access control for outsourcing data stream. 235-242 - Zheng Yang

, Junyu Lai, Wanping Liu, Chao Liu, Song Luo:
SignORKE: improving pairing-based one-round key exchange without random oracles. 243-249 - Yi-Ning Liu

, Qi Zhong
, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. 250-255 - Caixue Zhou, Zongmin Cui:

Certificate-based signature scheme in the standard model. 256-260 - Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie:

Constructions of involutions with optimal minimum degree. 261-266 - Santanu Sarkar

:
Results on significant anomalies of state values after key scheduling algorithm in RC4. 267-272 - Lei Cheng, Chao Li:

Revisiting impossible differentials of MARS-like structures. 273-276 - Kai Fu, Ling Sun, Meiqin Wang:

New integral attacks on SIMON. 277-286 - Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata

:
Computational SS and conversion protocols in both active and passive settings. 287-293 - Barsha Mitra, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
Migrating from RBAC to temporal RBAC. 294-300
Volume 11, Number 6, November 2017
- Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh, Jeng-Shyang Pan

:
Low-latency digit-serial dual basis multiplier for lightweight cryptosystems. 301-311 - Cuiping Shao, Huiyun Li, Jianbin Zhou:

Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test. 312-318 - Li Yang, Wei Huang, Xinxin Niu:

Defending shilling attacks in recommender systems using soft co-clustering. 319-325 - Samaneh Mashhadi

, Massoud Hadian Dehkordi, Niloofar Kiamari:
Provably secure verifiable multi-stage secret sharing scheme based on monotone span program. 326-331 - Javier Herranz

:
Attribute-based encryption implies identity-based encryption. 332-337 - Po-Hung Yang

, Sung-Ming Yen:
Memory attestation of wireless sensor nodes through trusted remote agents. 338-344 - Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu:

MNOS: a mimic network operating system for software defined networks. 345-355 - Nikita Veshchikov, Sylvain Guilley:

Implementation flaws in the masking scheme of DPA Contest v4. 356-362 - Zhen Ma

, Tian Tian, Wen-Feng Qi:
Internal state recovery of Grain v1 employing guess-and-determine attack. 363-368 - Wei Yang, Yadong Wan, Qin Wang:

Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things. 369-376 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:

Impossible differential attacks on the SKINNY family of block ciphers. 377-385 - Ricardo Julio Rodríguez

, Juan Carlos García-Escartín
:
Security assessment of the Spanish contactless identity card. 386-393

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














