Journal: IET Information Security

Volume 15, Issue 6

401 -- 416Xiangjun Li, Ke Kong, Su Xu, Pengtao Qin, Daojing He. Feature selection-based android malware adversarial sample generation and detection method
417 -- 427Wonhee Cho, Jiseung Kim 0001, Changmin Lee 0001. Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
428 -- 441Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010. Lattice-based revocable attribute-based encryption with decryption key exposure resistance
442 -- 456Qingyun Zhang, Xing Zhang, Mingyue Wang, Xiaohui Li. DPLQ: Location-based service privacy protection scheme based on differential privacy
457 -- 471Tao Hou, Ting Cui. Yoyo trick on type-II generalised Feistel networks
472 -- 486Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang 0002, Yiliang Han, Wenchao Liu. Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations
487 -- 495Yanjun Li, Hao Lin, Meng Liang, Ying Sun. A new quantum cryptanalysis method on block cipher Camellia