Journal: IET Information Security

Volume 11, Issue 6

301 -- 311Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh, Jeng-Shyang Pan. Low-latency digit-serial dual basis multiplier for lightweight cryptosystems
312 -- 318Cuiping Shao, Huiyun Li, Jianbin Zhou. Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test
319 -- 325Li Yang, Wei Huang, Xinxin Niu. Defending shilling attacks in recommender systems using soft co-clustering
326 -- 331Samaneh Mashhadi, Massoud Hadian Dehkordi, Niloofar Kiamari. Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
332 -- 337Javier Herranz. Attribute-based encryption implies identity-based encryption
338 -- 344Po-Hung Yang, Sung-Ming Yen. Memory attestation of wireless sensor nodes through trusted remote agents
345 -- 355Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu. MNOS: a mimic network operating system for software defined networks
356 -- 362Nikita Veshchikov, Sylvain Guilley. Implementation flaws in the masking scheme of DPA Contest v4
363 -- 368Zhen Ma, Tian Tian, Wen-Feng Qi. Internal state recovery of Grain v1 employing guess-and-determine attack
369 -- 376Wei Yang, Yadong Wan, Qin Wang. Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things
377 -- 385Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Impossible differential attacks on the SKINNY family of block ciphers
386 -- 393Ricardo Julio Rodríguez, Juan Carlos García-Escartín. Security assessment of the Spanish contactless identity card