Journal: IET Information Security

Volume 16, Issue 6

401 -- 416Ke Huang 0002, Xiaosong Zhang 0001, Yi Mu 0001, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong. Blockchain-based deduplication with arbitration and incentives
417 -- 431Linlin Xue, Yue Wang, Zhongpeng Wang. Secure image block compressive sensing using complex Hadamard measurement matrix and bit-level XOR
432 -- 441Yongqiang Yu, Xuehu Yan, Longlong Li, Jiayu Wang. Renewal of secret and shadows in secret image sharing
442 -- 458Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang. Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification
459 -- 469Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata. Matching attacks on Romulus-M
470 -- 481Adrián Ranea, Vincent Rijmen. Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
482 -- 0. Erratum: Quantum-resistant anonymous identity-based encryption with traceable identities