Journal: IET Information Security

Volume 11, Issue 1

1 -- 7Hasan Taha, Emad Alsusa. Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing
8 -- 15Xi Xiao, Zhenlong Wang, Qing Li, Shu-Tao Xia, Yong Jiang. Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
16 -- 22Muhammad Nasir Mumtaz Bhutta, Haitham S. Cruickshank, Zhili Sun. Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks
23 -- 33Y. Sreenivasa Rao. Signature-policy attribute-based key-insulated signature
34 -- 37Moon Sung Lee. Sparse subset sum problem from Gentry-Halevi's fully homomorphic encryption
38 -- 45Wenjun Fan, David Fernández, Zhihui Du. Versatile virtual honeynet management framework
46 -- 53Zhen Ma, Tian Tian, Wen-Feng Qi. Improved conditional differential attacks on Grain v1