Journal: IET Information Security

Volume 13, Issue 3

167 -- 173Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu. Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
174 -- 187Fuzhi Zhang, Zhoujun Ling, Shilei Wang. Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours
188 -- 200Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu. HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering
201 -- 212Somayeh Soltani, Seyed-Amin Hosseini-Seno, Hadi Sadoghi Yazdi. Event reconstruction using temporal pattern of file system modification
213 -- 222Ghania Ait Abdelmalek, Rezki Ziani, Rabah Mokdad. Security and fault tolerance evaluation of TMR-QDI circuits
223 -- 230Muhammad Sohail, Liangmin Wang, Shunrong Jiang, Samar Zaineldeen, Rana Umair Ashraf. ad-hoc networks using three-valued subjective logic
231 -- 238Aashish Parihar, Sangeeta Nakhate. Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem
239 -- 248Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte, Óscar López. Impact assessment of policy expressiveness of an optimised access control model for smart sensors
249 -- 257Bekir Unlu. Base for algebraic cryptanalysis based on combined representation of S-box
258 -- 268Zhigang Zhang, Chaowen Chang, Zhimin Guo, PeiSheng Han. Re-definable access control over outsourced data in cloud storage systems
269 -- 277Ahmet Ilhan Aysan, Fatih Sakiz, Sevil Sen. Analysis of dynamic code updating in Android with security perspective
278 -- 284Maryam Sheikhi-Garjan, Mojtaba Bahramian, Christophe Doche. Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
285 -- 292Meng Yue, Zhijun Wu, Jingjie Wang. Detecting LDoS attack bursts based on queue distribution