Journal: IET Information Security

Volume 12, Issue 2

107 -- 117Abdurrahman Pektas, Tankut Acarman. Malware classification based on API calls and behaviour analysis
118 -- 126William J. Buchanan, Scott Helme, Alan Woodward. Analysis of the adoption of security headers in HTTP
127 -- 132Shuaijianni Xu, Liang Feng Zhang. Cryptanalysis of Morillo-Obrador polynomial delegation schemes
133 -- 140Jianxiong Shao, Yu Qin, Dengguo Feng. Formal analysis of HMAC authorisation in the TPM2.0 specification
141 -- 149Shangping Wang, Xia Zhang, Yaling Zhang. Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
150 -- 156Girraj Kumar Verma, B. B. Singh. Efficient identity-based blind message recovery signature scheme from pairings
157 -- 164Xiaonan Wang, Zhengxiong Dou, Yi Mu. CCN framework with privacy support