Journal: IET Information Security

Volume 12, Issue 1

1 -- 6Kamaldeep, Manisha Malik, Maitreyee Dutta. Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks
7 -- 14Junjie Lv, Juling Rong. Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model
15 -- 24Golnar Assadat Afzali, Shahriar Mohammadi. Privacy preserving big data mining: association rule hiding using fuzzy logic approach
25 -- 33Hridoy Jyoti Mahanta, Ajoy Kumar Khan. Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation
34 -- 41Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref. A provably secure code-based concurrent signature scheme
42 -- 51Shijun Xiang, Jiayong He. Database authentication watermarking scheme in encrypted domain
52 -- 59Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh. Attribute-based broadcast encryption scheme for lightweight devices
60 -- 70Hassan Seifi, Saeed Parsa. Mining malicious behavioural patterns
71 -- 78Zheng Yang, Junyu Lai, Guoyuan Li. Cryptanalysis of a generic one-round key exchange protocol with strong security
79 -- 86Maria Isabel Gonzalez Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona. Group key exchange protocols withstanding ephemeral-key reveals
87 -- 93Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin. Security evaluation on Simeck against zero-correlation linear cryptanalysis
94 -- 99En Zhang, Jie Peng, Ming Li. Outsourcing secret sharing scheme based on homomorphism encryption
100 -- 106Shaoquan Jiang, Jue Li, Yongjian Liao. Efficient approximate message authentication scheme