Journal: IET Information Security

Volume 15, Issue 1

1 -- 12Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal. Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
13 -- 22Krishnaraj Bhat, K. R. Udaya Kumar Reddy, Ranjan Kumar H. S., Dindayal Mahto. A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
23 -- 37Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammad Zarour, Kenza Meridji. A reference measurement framework of software security product quality (SPQNFSR)
38 -- 58Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi. A behavioural in-depth analysis of ransomware infection
59 -- 75Cengiz Acartürk, Murat Ulubay, Efe Erdur. Continuous improvement on maturity and capability of Security Operation Centres
76 -- 86Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang. Private feasible solution determination
87 -- 97Yanjun Li, Jie Peng, Chik-How Tan, Haibin Kan, Lijing Zheng. Further constructions of bent functions and their duals
98 -- 106Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee. An efficient lattice-based threshold signature scheme using multi-stage secret sharing
107 -- 116Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang. Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature
117 -- 130Ozgur Oksuz. Time-specific encrypted range query with minimum leakage disclosure
131 -- 146Yumei Li, Futai Zhang, Yinxia Sun. Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system