Journal: IET Information Security

Volume 16, Issue 2

75 -- 85Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe 0001. Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC
86 -- 96Liang Liu 0012, Yue Yin, Zhijun Wu 0001, Qingbo Pan, Meng Yue. LDoS attack detection method based on traffic classification prediction
97 -- 110Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo. A deep learning-based attack on text CAPTCHAs by using object detection techniques
111 -- 126Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen. Quantum-resistant anonymous identity-based encryption with trable identities
127 -- 132Maria Chiara Molteni, Jürgen Pulkus, Vittorio Zaccaria. On robust strong-non-interferent low-latency multiplications
133 -- 143Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang. Authorisation inconsistency in IoT third-party integration