Journal: IET Information Security

Volume 16, Issue 3

145 -- 160Rentaro Shiba, Kosei Sakamoto, Takanori Isobe 0001. Efficient constructions for large-state block ciphers based on AES New Instructions
161 -- 177Mo Shaohui, Gulanbaier Tuerhong, Mairidan Wushouer, Tuergen Yibulayin. PCA mix-based Hotelling's T2 multivariate control charts for intrusion detection system
178 -- 192Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo. An optimal defensive deception framework for the container-based cloud with deep reinforcement learning
193 -- 207Yibing Liu, Lijun Huo, Gang Zhou. TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks
208 -- 219Jiseung Kim 0001, Changmin Lee 0001. Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
220 -- 234Zhengbin Liu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. On the upper bound of squared correlation of SIMON-like functions and its applications