Journal: IET Information Security

Volume 12, Issue 6

463 -- 474Frédéric Lafitte. CryptoSAT: a tool for SAT-based cryptanalysis
475 -- 483Mingxing Hu, Qing Ye, Yongli Tang. Efficient batch identity-based fully homomorphic encryption scheme in the standard model
484 -- 497Lin Jiao, Yongqiang Li, Yonglin Hao. Guess-and-determine attacks on PANAMA-like stream ciphers
498 -- 501Jiayang Liu, Jingguo Bi. Equivalent key attack against a public-key cryptosystem based on subset sum problem
502 -- 512Khundrakpam Johnson Singh, Thongam Khelchandra, Tanmay De. Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation
513 -- 520Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li 0006, Xiaoyang Dong, Yaoling Ding, Yonglin Hao. Improved integral attacks without full codebook
521 -- 526Amor Gueddana, Vasudevan Lakshminarayanan. Physical feasibility of QKD based on probabilistic quantum circuits
527 -- 533Jian Zou, Le Dong, Wenling Wu. New algorithms for the unbalanced generalised birthday problem
534 -- 542Guangliang Xu, Wei Yang 0011, Liusheng Huang. Supervised learning framework for covert channel detection in LTE-A
543 -- 550Mohammad Taherifard, Ahmad Patooghy, Mahdi Fazeli. Vulnerability modelling of crypto-chips against scan-based attacks
551 -- 557Md. Mokammel Haque, Josef Pieprzyk. Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm
558 -- 565Mina Sadat Khazaei, Hossein Homaei, Hamid Reza Shahriari. OPEXA: analyser assistant for detecting over-privileged extensions

Volume 12, Issue 5

389 -- 397Jiqiang Lu, Wun-She Yap, Yongzhuang Wei. Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
398 -- 403Tzuo-Yau Fan, Her-Chang Chao. User-friendly XOR-based visual secret sharing by random grid
404 -- 413Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García Teodoro, José Camacho, Lorenzo Cavallaro. Anomaly-based exploratory analysis and detection of exploits in android mediaserver
414 -- 418Zhixiong Chen. Linear complexity of Legendre-polynomial quotients
419 -- 424Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0
425 -- 430Dan Wang, Bing Guo, Yan Shen. Method for measuring the privacy level of pre-published dataset
431 -- 437Tao Chen, Michael Farcasin, Eric Chan-Tin. Smartphone passcode prediction
438 -- 444Penglin Yang, Limin Tao, Haitao Wang. RTTV: a dynamic CFI measurement tool based on TPM
445 -- 454Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei. Sequential opening multi-jammers localisation in multi-hop wireless network
455 -- 461Emre Yüce, Ali Aydn Selçuk. Server notaries: a complementary approach to the web PKI trust model

Volume 12, Issue 4

247 -- 0. Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016)
248 -- 256Vincenzo Iovino, Qiang Tang 0001, Karol Zebrowski. Power of public-key function-private functional encryption
257 -- 264Eunkyung Kim 0002, Mehdi Tibouchi. FHE over the integers and modular arithmetic circuits
265 -- 274Yusuke Naito 0001. Sandwich construction for keyed sponges: independence between capacity and construction queries
275 -- 284Sergio de los Santos, José Torres. Analysing HSTS and HPKP implementation in both browsers and servers
285 -- 292Emad S. Hassan, Amir Salah Elsafrawey, Moawad I. Dessouky. Trade-off between self-healing and energy consumption in mobile unattended WSNs
293 -- 304Deepak Rewadkar, Dharmpal Doye. Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET
305 -- 313Kunpeng Bai, Chuankun Wu, Zhenfeng Zhang. Protect white-box AES to resist table composition attacks
314 -- 325Sadegh Sadeghi, Nasour Bagheri. Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher
326 -- 331Zhe Xia, Zheng Tong, Min Xiao, Chin-Chen Chang 0001. Framework for practical and receipt-free remote voting
332 -- 340D. Menaga, S. Revathi. Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding
341 -- 347Özgü Can. Personalised anonymity for microdata release
348 -- 355Meltem Kurt Pehlivanoglu, Muharrem Tolga Sakalli, Sedat Akleylek, Nevcihan Duru, Vincent Rijmen. Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography
356 -- 361Yongkang Tang, Shaoqing Li, Fan Zhang, Liang Fang. Thermal maps based HT detection using spatial projection transformation
362 -- 374Yaojun Hao, Fuzhi Zhang. Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features
375 -- 380Yuan-Ping, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du. Deterministic lattice reduction on knapsacks with collision-free properties
381 -- 388ThienLuan Ho, Seong Je Cho, Seungrohk Oh. Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units

Volume 12, Issue 3

165 -- 0. Guest Editorial: Selected Papers from the Public Key Cryptography (PKC 2016) Conference
166 -- 183Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin. Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
184 -- 193Yusuke Sakai 0001, Nuttapong Attrapadung, Goichiro Hanaoka. Practical attribute-based signature schemes for circuits from bilinear map
194 -- 206Sebastian Meiser 0001, Dominique Schröder. Delegatable functional signatures
207 -- 216Angelo De Caro, Vincenzo Iovino, Adam O'Neill. Receiver- and sender-deniable functional encryption
217 -- 225Samuel Neves, Mehdi Tibouchi. Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models
226 -- 237Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng. Mimic defense: a designed-in cybersecurity defense framework
238 -- 245Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steven Furnell. Information security collaboration formation in organisations

Volume 12, Issue 2

107 -- 117Abdurrahman Pektas, Tankut Acarman. Malware classification based on API calls and behaviour analysis
118 -- 126William J. Buchanan, Scott Helme, Alan Woodward. Analysis of the adoption of security headers in HTTP
127 -- 132Shuaijianni Xu, Liang Feng Zhang. Cryptanalysis of Morillo-Obrador polynomial delegation schemes
133 -- 140Jianxiong Shao, Yu Qin, Dengguo Feng. Formal analysis of HMAC authorisation in the TPM2.0 specification
141 -- 149Shangping Wang, Xia Zhang, Yaling Zhang. Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
150 -- 156Girraj Kumar Verma, B. B. Singh. Efficient identity-based blind message recovery signature scheme from pairings
157 -- 164Xiaonan Wang, Zhengxiong Dou, Yi Mu. CCN framework with privacy support

Volume 12, Issue 1

1 -- 6Kamaldeep, Manisha Malik, Maitreyee Dutta. Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks
7 -- 14Junjie Lv, Juling Rong. Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model
15 -- 24Golnar Assadat Afzali, Shahriar Mohammadi. Privacy preserving big data mining: association rule hiding using fuzzy logic approach
25 -- 33Hridoy Jyoti Mahanta, Ajoy Kumar Khan. Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation
34 -- 41Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref. A provably secure code-based concurrent signature scheme
42 -- 51Shijun Xiang, Jiayong He. Database authentication watermarking scheme in encrypted domain
52 -- 59Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh. Attribute-based broadcast encryption scheme for lightweight devices
60 -- 70Hassan Seifi, Saeed Parsa. Mining malicious behavioural patterns
71 -- 78Zheng Yang, Junyu Lai, Guoyuan Li. Cryptanalysis of a generic one-round key exchange protocol with strong security
79 -- 86Maria Isabel Gonzalez Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona. Group key exchange protocols withstanding ephemeral-key reveals
87 -- 93Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin. Security evaluation on Simeck against zero-correlation linear cryptanalysis
94 -- 99En Zhang, Jie Peng, Ming Li. Outsourcing secret sharing scheme based on homomorphism encryption
100 -- 106Shaoquan Jiang, Jue Li, Yongjian Liao. Efficient approximate message authentication scheme