- Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang. A Second Preimage Attack on the XOR Hash Combiner. IET Information Security, 2024:1-7, 2024.
- Guangqiu Lv, Chenhui Jin, Zhen Shi, Ting Cui. Unveiling the Neutral Difference and Its Automated Search. IET Information Security, 2024:1-15, 2024.
- Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao 0010, Baocang Wang. Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. IET Information Security, 2024:1-16, 2024.
- Lin Jiao, Yongqiang Li 0001, Yonglin Hao, Xinxin Gong. Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA. IET Information Security, 2024:1-11, 2024.
- Armita Kazeminajafabadi, Mahdi Imani. Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach. IET Information Security, 2024:1-20, 2024.
- Xiaohui Yang, Jing Liu. HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes. IET Information Security, 2024:1-14, 2024.
- Lin Wang. Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard. IET Information Security, 2024:1-17, 2024.
- Yanxia Dui, Hongchun Hu. Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms. IET Information Security, 2024(1), 2024.
- Ying-Ti Tsai, Chung-Ho Wang, Yung-Chia Chang, Lee-Ing Tong. Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. IET Information Security, 2024(1), 2024.
- Selvakumar Shanmugam, Rajesh Natarajan, H. L. Gururaj, Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar. Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services. IET Information Security, 2024(1), 2024.