Journal: IET Information Security

Volume 14, Issue 6

613 -- 624Toru Nakanishi 0001, Takeshi Kanatani. Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator
625 -- 632Eman Abouelkheir, Shamia El-sherbiny. Pairing free identity based aggregate signcryption scheme
633 -- 640Kaushik Nath 0001, Palash Sarkar 0001. Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level
641 -- 653Geng Li, Jianwei Liu 0001, Zongyang Zhang. More realistic analysis of mass surveillance - security in multi-surveillant settings
654 -- 660Shishi Liu, Fengrong Zhang, Enes Pasalic, Shixiong Xia, Zepeng Zhuo. Further study on constructing bent functions outside the completed Maiorana-McFarland class
661 -- 669Sumit Kumar Debnath, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu. Post-quantum protocol for computing set intersection cardinality with linear complexity
670 -- 682Sona Alex, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran. SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby
683 -- 693Emre Dandil. C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic
694 -- 703Samaneh Hosseini Moghaddam, Maghsoud Abbaspour. Economic feasibility study for stealthy socialbot network establishment
704 -- 723Mukti Padhya, Devesh C. Jinwala. 2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation
724 -- 732Qi Feng, Debiao He, Huaqun Wang, Ding Wang 0002, Xinyi Huang. Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
733 -- 744Zhicheng Yan, Chao Yang 0016, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma 0001. Achieving secure and convenient WLAN sharing in personal
745 -- 753Neha Sharma, Jeebananda Panda. Statistical watermarking approach for 3D mesh using local curvature estimation
754 -- 763Farhad Farokhi. Non-stochastic hypothesis testing for privacy
764 -- 772Runzhi Zeng, Libin Wang. Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem
773 -- 782Ishu Gupta, Ashutosh Kumar Singh. GUIM-SMD: guilty user identification model using summation matrix-based distribution
783 -- 790Jing Yang, Fang-Wei Fu. New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem

Volume 14, Issue 5

483 -- 492Congming Wei, Jiazhe Chen, an Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang 0001. x-only coordinate: with application to secp256k1
496 -- 504Dipayan Das 0001, Vishal Saraswat, Kajla Basu. Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems
505 -- 512Yaxin Cui, Hong Xu, Wenfeng Qi. Improved integral attacks on 24-round LBlock and LBlock-s
513 -- 520Uthirapathy Palani, Gopal Amuthavalli, Vaithiyanathan Alamelumangai. Secure and load-balanced routing protocol in wireless sensor network or disaster management
521 -- 530Sreyosi Bhattacharyya, Palash Sarkar 0001. Improved SIMD implementation of Poly1305
531 -- 541Janani Thiyagarajan, A. Akash, Brindha Murugan. Improved real-time permission based malware detection and clustering approach using model independent pruning
542 -- 552Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao. Threat model and construction strategy on ADS-B attack data
553 -- 561Alireza Toroghi Haghighat, Mehdi Shajari. Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools
562 -- 571Wen Wen Koh, Chai Wen Chuah. Robust security framework with bit-flipping attack and timing attack for key derivation functions
572 -- 579Wenqiang Tian, Bin Hu. Integral cryptanalysis on two block ciphers Pyjamask and uBlock
580 -- 586Yu Ou, Lang Li. Research on a high-order AES mask anti-power attack
587 -- 594Sudong Ma, Jie Guan.
595 -- 603Elnaz Bagherzadeh, Zahra Ahmadian. MILP-based automatic differential search for LEA and HIGHT block ciphers
604 -- 611Mojtaba Zaheri, Babak Sadeghiyan. SMT-based cube attack on round-reduced Simeck32/64

Volume 14, Issue 4

367 -- 0. Guest Editorial: Security on Mobile and IoT Devices
368 -- 379Max Ingham, Jims Marchang, Deepayan Bhowmik. IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN
380 -- 390Mengxia Shuai, Ling Xiong, Changhui Wang, Nenghai Yu. Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs
391 -- 400Amit Kumar Roy, Ajoy Kumar Khan. Privacy preservation with RTT-based detection for wireless mesh networks
401 -- 409Xiujuan Wang, Haoyang Tang, Kangfeng Zheng, Yuanrui Tao. Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process
410 -- 418Eligijus Sakalauskas, Aleksejus Mihalkovich, Arnas Uselis. Security analysis of KAP based on enhanced MPF
419 -- 429Lahouari Ghouti, Muhammad Imam. Malware classification using compact image features and multiclass support vector machines
430 -- 441Chen-Dong Ye, Tian Tian. Algebraic method to recover superpolies in cube attacks
443 -- 451Qi Feng, Debiao He, Zhe Liu 0001, Ding Wang 0002, Kim-Kwang Raymond Choo. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme
452 -- 458Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee. Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network
459 -- 469Mohammad Taherifard, Mahdi Fazeli, Ahmad Patooghy. Scan-based attack tolerance with minimum testability loss: a gate-level approach
470 -- 481Jinguo Li, Mi Wen, Kai Zhang. Cloud-assisted secure and conjunctive publish/subscribe service in smart grids

Volume 14, Issue 3

253 -- 0. Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS)
254 -- 265Kimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang 0001. Faster privacy-preserving location proximity schemes for circles and polygons
266 -- 285Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. Fully invisible protean signatures schemes
286 -- 303Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda. Impact of the modulus switching technique on some attacks against learning problems
304 -- 312Paolo Santini, Marco Baldi, Franco Chiaraluce. Complexity of statistical attacks on QC-LDPC code-based cryptosystems
313 -- 320Zhen Liu, Yanbin Pan, Tianyuan Xie. Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
321 -- 331Ji Li 0004, Jianghong Wei, Mao Ye 0004, Wenfen Liu, Xuexian Hu. Privacy-preserving constrained spectral clustering algorithm for large-scale data sets
332 -- 341Fariba Khazaei Koohpar, Afsaneh Fatemi, Fatemeh Raji. Data availability improvement in peer-to-peer online social networks
342 -- 351Xuyang Wang, Aiqun Hu, Hao Fang. Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice
352 -- 364Mahmoud Ghorbanzadeh, Hamid Reza Shahriari. ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis
365 -- 366Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks

Volume 14, Issue 2

151 -- 156Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami. New single-trace side-channel attacks on a specific class of Elgamal cryptosystem
157 -- 165Ya Wen Wang, Yunfei Guo, Zehua Guo 0001, Wenyan Liu, Chao Yang 0012. Protecting scientific workflows in clouds with an intrusion tolerant system
166 -- 174Rui-Hong Dong, Xue-Yong Li, Qiu-yu Zhang, Hui Yuan. Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
175 -- 184Xiaoyang Liu, Jiamiao Liu. Novel non-linear dynamics P2P network worm propagation and immune model
185 -- 195Jun Liu, Jia Yan, Dexiang Deng, Ruijue Zhang. Fingerprint image quality assessment based on BP neural network with hierarchical clustering
196 -- 201Dung Hoang Duong, Le Van Luyen, Ha Thanh Nguyen Tran. Choosing subfields for LUOV and lifting fields for rainbow
202 -- 209Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany. Framework for faster key search using related-key higher-order differential properties: applications to Agrasta
210 -- 219Nazanin Bakhshinejad, Ali Hamzeh. Parallel-CNN network for malware detection
220 -- 231Binbin Tu, Yu Chen, Xueli Wang. Threshold trapdoor functions and their applications
232 -- 240Ziwang Wang, Yi Zhuang 0002, Qingxun Xia. Mutual authentication-based RA scheme for embedded systems
241 -- 252Miguel Rodríguez-Veliz, Yulier Nuñez-Musa, Roberto Sepúlveda Lima. Call graph obfuscation and diversification: an approach

Volume 14, Issue 1

1 -- 11Shitharth Selvarajan, Masood Shaik, Sirajudeen Ameerjohn, Sangeetha Kannan. Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm
12 -- 20Ling Sun 0001, Wei Wang, Meiqin Wang. MILP-aided bit-based division property for primitives with non-bit-permutation linear layers
21 -- 29Ikram Gharsallah, Salima Smaoui, Faouzi Zarai. An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks
30 -- 38Huang Zhang, Fangguo Zhang, Baodian Wei, Yusong Du. Implementing confidential transactions with lattice techniques
39 -- 50Hisham A. Kholidy. Correlation-based sequence alignment models for detecting masquerades in cloud computing
51 -- 59Thomas Shortell, Ali Shokoufandeh. Secure signal processing using fully homomorphic encryption
60 -- 71Junaid Akram, Ping Luo 0004. How to build a vulnerability benchmark to overcome cyber security attacks
72 -- 80Zahra Eskandari, Abbas Ghaemi Bafghi. Cube distinguisher extraction using division property in block ciphers
82 -- 88Jian Wang 0039, Guosheng Zhao, Zhong-Nan Zhao, Zhixin Li. Dynamic resource virtualisation method for survivability enhancement based on SDN
89 -- 98Nadjah Chergui, Boustia Narhimene. Contextual-based approach to reduce false positives
99 -- 110Xuelian Li, Yue Han, Juntao Gao, Jie Niu. Secure hierarchical authentication protocol in VANET
111 -- 125Lin Jiao. Specifications and improvements of LPN solving algorithms
126 -- 132Rongjia Li, Chenhui Jin, Hongchen Pan. Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions
133 -- 145Mohammad Shakibazad, Ali Jabbar Rashidi. New method for assets sensitivity calculation and technical risks assessment in the information systems
146 -- 150Arkadii Slinko. Ways to merge two secret sharing schemes