Journal: IET Information Security

Volume 12, Issue 5

389 -- 397Jiqiang Lu, Wun-She Yap, Yongzhuang Wei. Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
398 -- 403Tzuo-Yau Fan, Her-Chang Chao. User-friendly XOR-based visual secret sharing by random grid
404 -- 413Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García Teodoro, José Camacho, Lorenzo Cavallaro. Anomaly-based exploratory analysis and detection of exploits in android mediaserver
414 -- 418Zhixiong Chen. Linear complexity of Legendre-polynomial quotients
419 -- 424Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0
425 -- 430Dan Wang, Bing Guo, Yan Shen. Method for measuring the privacy level of pre-published dataset
431 -- 437Tao Chen, Michael Farcasin, Eric Chan-Tin. Smartphone passcode prediction
438 -- 444Penglin Yang, Limin Tao, Haitao Wang. RTTV: a dynamic CFI measurement tool based on TPM
445 -- 454Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei. Sequential opening multi-jammers localisation in multi-hop wireless network
455 -- 461Emre Yüce, Ali Aydn Selçuk. Server notaries: a complementary approach to the web PKI trust model