Journal: IET Information Security

Volume 14, Issue 2

151 -- 156Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami. New single-trace side-channel attacks on a specific class of Elgamal cryptosystem
157 -- 165Ya Wen Wang, Yunfei Guo, Zehua Guo 0001, Wenyan Liu, Chao Yang 0012. Protecting scientific workflows in clouds with an intrusion tolerant system
166 -- 174Rui-Hong Dong, Xue-Yong Li, Qiu-yu Zhang, Hui Yuan. Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
175 -- 184Xiaoyang Liu, Jiamiao Liu. Novel non-linear dynamics P2P network worm propagation and immune model
185 -- 195Jun Liu, Jia Yan, Dexiang Deng, Ruijue Zhang. Fingerprint image quality assessment based on BP neural network with hierarchical clustering
196 -- 201Dung Hoang Duong, Le Van Luyen, Ha Thanh Nguyen Tran. Choosing subfields for LUOV and lifting fields for rainbow
202 -- 209Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany. Framework for faster key search using related-key higher-order differential properties: applications to Agrasta
210 -- 219Nazanin Bakhshinejad, Ali Hamzeh. Parallel-CNN network for malware detection
220 -- 231Binbin Tu, Yu Chen, Xueli Wang. Threshold trapdoor functions and their applications
232 -- 240Ziwang Wang, Yi Zhuang 0002, Qingxun Xia. Mutual authentication-based RA scheme for embedded systems
241 -- 252Miguel Rodríguez-Veliz, Yulier Nuñez-Musa, Roberto Sepúlveda Lima. Call graph obfuscation and diversification: an approach