Journal: IET Information Security

Volume 10, Issue 3

113 -- 118Gareth Owen, Nick Savage. Empirical analysis of Tor Hidden Services
119 -- 124Xiaoming Wang, Yanchun Lin, Yu Fang. Authenticating multi-dimensional query results in outsourced database
125 -- 133Stavros Papadopoulos 0002, Konstantinos Moustakas, Anastasios Drosou, Dimitrios Tzovaras. Border gateway protocol graph: detecting and visualising internet routing anomalies
134 -- 141Quanqiang Zhou. Supervised approach for detecting average over popular items attack in collaborative recommender systems
142 -- 151Yonglin Hao. Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers
152 -- 155Houzhen Wang, Huanguo Zhang, Shaohua Tang. Key recovery on several matrix public-key encryption schemes
156 -- 164Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia. Covert communications through mobile voice channels