Journal: IET Information Security

Volume 13, Issue 6

519 -- 529Zhouhang Cheng, Haichang Gao, Zhongyu Liu, Huaxi Wu, Yang Zi, Ge Pei. Image-based CAPTCHAs based on neural style transfer
530 -- 540Iman Vakilinia, Shamik Sengupta. Fair and private rewarding in a coalitional game of cybersecurity information sharing
541 -- 551Dingyu Yan, Feng Liu 0001, Yaqin Zhang, Kun Jia. Dynamical model for individual defence against cyber epidemic attacks
552 -- 558Athmane Seghier, Jianxin Li, Dazhi Sun. Advanced encryption standard based on key dependent S-Box cube
559 -- 569Samir Hodzic, Enes Pasalic, Yongzhuang Wei. Guess and determine cryptanalysis with variable sampling and its applications
570 -- 578Christoforos Ntantogian, Georgios Poulios, Georgios Karopoulos, Christos Xenakis. Transforming malicious code to ROP gadgets for antivirus evasion
579 -- 590Huiqin Xie, Li Yang. Witness indistinguishability and witness hiding against quantum attacks
591 -- 602Kakumani K. C. Deepthi, Kunwar Singh. Cryptanalysis for reduced round Salsa and ChaCha: revisited
603 -- 613Deepak Kumar Dalai, Subhamoy Maitra, Santu Pal, Dibyendu Roy 0001. Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs
614 -- 617SrinivasaRao SubramanyaRao, Zhi Hu, Chang-An Zhao. Division polynomial-based elliptic curve scalar multiplication revisited
618 -- 638Dario Fiore, Aikaterini Mitrokotsa, Luca Nizzardo, Elena Pagnin. Multi-key homomorphic authenticators
639 -- 648Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen. Fully homomorphic encryption based on the ring learning with rounding problem
649 -- 658Huidan Hu, Changlu Lin, Chin-Chen Chang 0001, Lanxiang Chen. Enhanced secure data backup scheme using multi-factor authentication
659 -- 669Waleed Ali 0001, Adel Ali Ahmed. Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting
670 -- 684Dimitrios Papachristoudis, Dimitrios Hristu-Varsakelis, Foteini Baldimtsi, George Stephanides. Leakage-resilient lattice-based partially blind signatures
685 -- 691Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang. +14 ABE with weakness analysis
692 -- 702Prathiba Ashok, Kanchana Bhaaskaran Vettuvanam Somasundaram. Charge balancing symmetric pre-resolve adiabatic logic against power analysis attacks
703 -- 710Jikai Teng, Hongyang Ma. Dynamic asymmetric group key agreement protocol with traitor traceability

Volume 13, Issue 5

411 -- 419Lin Jiao, Yonglin Hao, Yongqiang Li. Improved guess-and-determine attack on TRIVIUM
420 -- 425Jin-Yuan Wang, Sheng-Hong Lin, Wei Cai, Jianxin Dai. ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels
426 -- 434Yanwei Zhou, Bo Yang 0003, Yi Mu 0001, Tao Wang 0039, Xin Wang 0058. Identity-based encryption resilient to continuous key leakage
435 -- 447Matej Zuzcak, Petr Bujok. Causal analysis of attacks against honeypots based on properties of countries
448 -- 458Hossein Arabnezhad Khanooki, Babak Sadeghiyan, Josef Pieprzyk. S-boxes representation and efficiency of algebraic attack
459 -- 468Parvin Rastegari, Mohammad Dakhilalian, Mehdi Berenjkoub, Willy Susilo. Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
469 -- 478Hailun Yan, Xuejia Lai, Lei Wang 0031, Yu Yu 0001, Yiran Xing. New zero-sum distinguishers on full 24-round Keccak-f using the division property
479 -- 485Lingchen Li, Wenling Wu, Lei Zhang 0012, Yafei Zheng. New method to describe the differential distribution table for large S-boxes in MILP and its application
486 -- 495Morteza Noferesti, Rasool Jalili. Inline high-bandwidth network analysis using a robust stream clustering algorithm
498 -- 507David Nuñez 0001, Isaac Agudo, Javier López 0001. Escrowed decryption protocols for lawful interception of encrypted data
508 -- 514Bagher Bagherpour, Ali Zaghian, Mahdi Sajadieh. Sigma protocol for faster proof of simultaneous homomorphism relations
515 -- 518Tianfeng Sun, Bin Hu, Yang Yang. Research on highly non-linear plateaued functions

Volume 13, Issue 4

293 -- 303Mehran Alidoost Nia, Behnam Bahrak, Mehdi Kargahi, Benjamin Fabian. Detecting new generations of threats using attribute-based attack graphs
304 -- 310Maamar Ouladj, Phillipe Guillot, Farid Mokrane. Chosen message strategy to improve the correlation power analysis
311 -- 320Samiran Bag, Muhammad Ajmal Azad, Feng Hao. PriVeto: a fully private two-round veto protocol
321 -- 329J. Anitha Ruth, H. Sirmathi, A. Meenakshi. Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks
330 -- 335Xiaona Zhang, Li-Ping Wang, Jun Xu 0022. Certifying multi-power RSA
336 -- 342Mahnaz Noroozi, Ziba Eslami. Public key authenticated encryption with keyword search: revisited
343 -- 351Massoud Hadian Dehkordi, Hossein Oraei. How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes
352 -- 361Ali Moradi Vartouni, Mohammad Teshnehlab, Saeed Sedighian Kashi. Leveraging deep neural networks for anomaly-based web application firewall
362 -- 366Marta Conde Pena, Raúl Durán Díaz, Jean-Charles Faugère, Luis Hernández Encinas, Ludovic Perret. Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme
367 -- 377Mingdong Tang, Quan Qian. Dynamic API call sequence visualisation for malware classification
378 -- 388Dhiman Saha, Sourya Kakarla, Dipanwita Roy Chowdhury. Dinamite: internal differential match-in-the-end attack on eight-round PAEQ
393 -- 403Yizhi Zhao, Shiwei Xu, Hongmei Chi. Encrypted secure polar coding scheme for general two-way wiretap channel
404 -- 410Marco Baldi, Franco Chiaraluce, Joachim Rosenthal, Paolo Santini, Davide Schipani. Security of generalised Reed-Solomon code-based cryptosystems

Volume 13, Issue 3

167 -- 173Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu. Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
174 -- 187Fuzhi Zhang, Zhoujun Ling, Shilei Wang. Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours
188 -- 200Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu. HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering
201 -- 212Somayeh Soltani, Seyed-Amin Hosseini-Seno, Hadi Sadoghi Yazdi. Event reconstruction using temporal pattern of file system modification
213 -- 222Ghania Ait Abdelmalek, Rezki Ziani, Rabah Mokdad. Security and fault tolerance evaluation of TMR-QDI circuits
223 -- 230Muhammad Sohail, Liangmin Wang, Shunrong Jiang, Samar Zaineldeen, Rana Umair Ashraf. ad-hoc networks using three-valued subjective logic
231 -- 238Aashish Parihar, Sangeeta Nakhate. Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem
239 -- 248Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte, Óscar López. Impact assessment of policy expressiveness of an optimised access control model for smart sensors
249 -- 257Bekir Unlu. Base for algebraic cryptanalysis based on combined representation of S-box
258 -- 268Zhigang Zhang, Chaowen Chang, Zhimin Guo, PeiSheng Han. Re-definable access control over outsourced data in cloud storage systems
269 -- 277Ahmet Ilhan Aysan, Fatih Sakiz, Sevil Sen. Analysis of dynamic code updating in Android with security perspective
278 -- 284Maryam Sheikhi-Garjan, Mojtaba Bahramian, Christophe Doche. Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
285 -- 292Meng Yue, Zhijun Wu, Jingjie Wang. Detecting LDoS attack bursts based on queue distribution

Volume 13, Issue 2

87 -- 95Wenying Zhang, Vincent Rijmen. Division cryptanalysis of block ciphers with a binary diffusion layer
96 -- 103Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. Security analysis of ABAC under an administrative model
104 -- 108Huawang Qin, Raylin Tso, Yuewei Dai. Quantum secret sharing by using Fourier transform on orbital angular momentum
109 -- 116Weijie Han, Jingfeng Xue, Hui Yan. Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine
117 -- 124Yongzhuang Wei, Fu Yao, Enes Pasalic, an Wang. New second-order threshold implementation of AES
125 -- 132Yafei Zheng, Wenling Wu. On the extension and security of key schedule of GOST
133 -- 140Aniket Bhadane, Sunil B. Mane. Detecting lateral spear phishing attacks in organisations
141 -- 148Jun-Zhi Li, Jie Guan. Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1
149 -- 156Rongrong Xi, Xiaochun Yun, Zhiyu Hao. Framework for risk assessment in cyber situational awareness
157 -- 166Qiang Zhang, Jianzhong Qiao, Qingyang Meng. Build a trusted storage system on a mobile phone

Volume 13, Issue 1

1 -- 6Qian Li, Rangding Wang, Dawen Xu 0001. Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients
7 -- 18Nilesh Chakraborty, Samrat Mondal. Towards incorporating honeywords in n-session recording attack resilient unaided authentication services
19 -- 26Seyyedeh Atefeh Musavi, Mahmoud Reza Hashemi. HPCgnature: a hardware-based application-level intrusion detection system
27 -- 35Richard Rivera, Platon Kotzias, Avinash Sudhodanan, Juan Caballero. Costly freeware: a systematic analysis of abuse in download portals
36 -- 47Miodrag J. Mihaljevic, Frédérique E. Oggier. Security evaluation and design elements for a class of randomised encryptions
48 -- 53Yang Jia, Meng Wang, Yagang Wang. Network intrusion detection algorithm based on deep neural network
54 -- 60Bardiya Barari, Pedram Kheirkhah Sangdeh, Bahareh Akhbari. Secure degrees of freedom of two-user X-channel with synergistic alternating channel state information at transmitters
61 -- 69Cheng Guo, Pengxu Tian, Chin-Chen Chang. Privacy preserving weighted similarity search scheme for encrypted data
70 -- 75Rongjia Li, Chenhui Jin. Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
76 -- 85Hyungyu Lee, Changwoo Pyo, Gyungho Lee. Dynamic reencryption of return addresses