Journal: IET Information Security

Volume 14, Issue 4

367 -- 0. Guest Editorial: Security on Mobile and IoT Devices
368 -- 379Max Ingham, Jims Marchang, Deepayan Bhowmik. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
380 -- 390Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu. Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs
391 -- 400Amit Kumar Roy, Ajoy Kumar Khan. Privacy preservation with RTT-based detection for wireless mesh networks
401 -- 409Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao. Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process
410 -- 418Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis. Security analysis of KAP based on enhanced MPF
419 -- 429Lahouari Ghouti, Muhammad Imam. Malware classification using compact image features and multiclass support vector machines
430 -- 441Chen-Dong Ye, Tian Tian. Algebraic method to recover superpolies in cube attacks
443 -- 451Qi Feng, Debiao He, Zhe Liu 0001, Ding Wang 0002, Kim-Kwang Raymond Choo. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme
452 -- 458Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee. Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network
459 -- 469Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy. Scan-based attack tolerance with minimum testability loss: a gate-level approach
470 -- 481Jinguo Li, Mi Wen, Kai Zhang. Cloud-assisted secure and conjunctive publish/subscribe service in smart grids