Journal: IET Information Security

Volume 14, Issue 6

613 -- 624Toru Nakanishi 0001, Takeshi Kanatani. Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator
625 -- 632Eman Abouelkheir, Shamia El-sherbiny. Pairing free identity based aggregate signcryption scheme
633 -- 640Kaushik Nath 0001, Palash Sarkar 0001. Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level
641 -- 653Geng Li, Jianwei Liu 0001, Zongyang Zhang. More realistic analysis of mass surveillance - security in multi-surveillant settings
654 -- 660Shishi Liu, Fengrong Zhang, Enes Pasalic, Shixiong Xia, Zepeng Zhuo. Further study on constructing bent functions outside the completed Maiorana-McFarland class
661 -- 669Sumit Kumar Debnath, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu. Post-quantum protocol for computing set intersection cardinality with linear complexity
670 -- 682Sona Alex, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran. SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby
683 -- 693Emre Dandil. C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic
694 -- 703Samaneh Hosseini Moghaddam, Maghsoud Abbaspour. Economic feasibility study for stealthy socialbot network establishment
704 -- 723Mukti Padhya, Devesh C. Jinwala. 2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation
724 -- 732Qi Feng, Debiao He, Huaqun Wang, Ding Wang 0002, Xinyi Huang. Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
733 -- 744Zhicheng Yan, Chao Yang 0016, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma 0001. Achieving secure and convenient WLAN sharing in personal
745 -- 753Neha Sharma, Jeebananda Panda. Statistical watermarking approach for 3D mesh using local curvature estimation
754 -- 763Farhad Farokhi. Non-stochastic hypothesis testing for privacy
764 -- 772Runzhi Zeng, Libin Wang. Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem
773 -- 782Ishu Gupta, Ashutosh Kumar Singh. GUIM-SMD: guilty user identification model using summation matrix-based distribution
783 -- 790Jing Yang, Fang-Wei Fu. New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem