Journal: IET Information Security

Volume 13, Issue 6

519 -- 529Zhouhang Cheng, Haichang Gao, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei. Image-based CAPTCHAs based on neural style transfer
530 -- 540Iman Vakilinia, Shamik Sengupta. Fair and private rewarding in a coalitional game of cybersecurity information sharing
541 -- 551Dingyu Yan, Feng Liu 0001, Yaqin Zhang, Kun Jia. Dynamical model for individual defence against cyber epidemic attacks
552 -- 558Athmane Seghier, Jianxin Li, Dazhi Sun. Advanced encryption standard based on key dependent S-Box cube
559 -- 569Samir Hodzic, Enes Pasalic, Yongzhuang Wei. Guess and determine cryptanalysis with variable sampling and its applications
570 -- 578Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis. Transforming malicious code to ROP gadgets for antivirus evasion
579 -- 590Huiqin Xie, Li Yang. Witness indistinguishability and witness hiding against quantum attacks
591 -- 602Kakumani K. C. Deepthi, Kunwar Singh. Cryptanalysis for reduced round Salsa and ChaCha: revisited
603 -- 613Deepak Kumar Dalai, Subhamoy Maitra, Santu Pal, Dibyendu Roy 0001. Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs
614 -- 617SrinivasaRao SubramanyaRao, Zhi Hu, Chang-An Zhao. Division polynomial-based elliptic curve scalar multiplication revisited
618 -- 638Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin. Multi-key homomorphic authenticators
639 -- 648Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen. Fully homomorphic encryption based on the ring learning with rounding problem
649 -- 658Huidan Hu, Changlu Lin, Chin-Chen Chang 0001, Lanxiang Chen. Enhanced secure data backup scheme using multi-factor authentication
659 -- 669Waleed Ali 0001, Adel Ali Ahmed. Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting
670 -- 684Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides. Leakage-resilient lattice-based partially blind signatures
685 -- 691Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang. +14 ABE with weakness analysis
692 -- 702Prathiba Ashok, Kanchana Bhaaskaran Vettuvanam Somasundaram. Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks
703 -- 710Jikai Teng, Hongyang Ma. Dynamic asymmetric group key agreement protocol with traitor traceability