Journal: IET Information Security

Volume 15, Issue 6

401 -- 416Xiangjun Li, Ke Kong, Su Xu, Pengtao Qin, Daojing He. Feature selection-based android malware adversarial sample generation and detection method
417 -- 427Wonhee Cho, Jiseung Kim 0001, Changmin Lee 0001. Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
428 -- 441Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao 0010. Lattice-based revocable attribute-based encryption with decryption key exposure resistance
442 -- 456Qingyun Zhang, Xing Zhang, Mingyue Wang, Xiaohui Li. DPLQ: Location-based service privacy protection scheme based on differential privacy
457 -- 471Tao Hou, Ting Cui. Yoyo trick on type-II generalised Feistel networks
472 -- 486Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang 0002, Yiliang Han, Wenchao Liu. Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations
487 -- 495Yanjun Li, Hao Lin, Meng Liang, Ying Sun. A new quantum cryptanalysis method on block cipher Camellia

Volume 15, Issue 5

333 -- 350Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue 0001. Homomorphic signcryption with public plaintext-result checkability
351 -- 363Ming Chen 0003, Jing Chen 0026, Xianglin Wei, Bing Chen 0002. Is low-rate distributed denial of service a great threat to the Internet?
364 -- 374Daniel Cervantes-Vázquez, Eduardo Ochoa-Jiménez, Francisco Rodríguez-Henríquez. Extended supersingular isogeny Diffie-Hellman key exchange protocol: Revenge of the SIDH
375 -- 394Farhana Jabeen, Zia-ur-Rehman Khan, Zara Hamid, Zobia Rehman, Abid Khan. Adaptive and survivable trust management for Internet of Things systems
395 -- 400Dachao Wang, Baocang Wang, Yuan-Ping. Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018

Volume 15, Issue 4

267 -- 281Ye Yuan 0005, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi. Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform
282 -- 296Ferucio Laurentiu Tiplea, Constantin Catalin Dragan. Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures
297 -- 308Amin Sarihi, Ahmad Patooghy, Mahdi Amininasab, Mohammad Shokrolah-Shirazi, Abdel-Hameed A. Badawy. Joint security and performance improvement in multilevel shared caches
309 -- 316Juha Partala. Indifferentiable hash functions in the standard model
317 -- 332Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay. Lattice-based nominative signature using pseudorandom function

Volume 15, Issue 3

205 -- 222Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari. Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures
223 -- 230Chris J. Mitchell. How not to secure wireless sensor networks: a plethora of insecure polynomial-based key pre-distribution schemes
231 -- 246Sébastien Canard, Chaoyun Li. Towards practical intrusion detection system over encrypted traffic
247 -- 255Manman Li, Shaozhen Chen. Improved meet-in-the-middle attacks on reduced-round Joltik-BC
256 -- 266Shivangi Shukla, Sankita J. Patel. Securing fingerprint templates by enhanced minutiae-based encoding scheme in Fuzzy Commitment

Volume 15, Issue 2

147 -- 155Yupu Hu, Siyue Dong, Xingting Dong. Analysis on Aigis-Enc: Asymmetrical and symmetrical
156 -- 168Quanlong Zhu, Chao Yang 0016, Yu Zheng 0004, Jianfeng Ma 0001, Hui Li 0006, Junwei Zhang 0001, Jiajie Shao. Smart home: Keeping privacy based on Air-Padding
169 -- 177Marwan Ali Albahar. A hybrid model for fake news detection: Leveraging news content and user comments in fake news
178 -- 190Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany. T-SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
191 -- 204Suliman A. Alsuhibany, Latifah A. Alreshoodi. Detecting human attacks on text-based CAPTCHAs using the keystroke dynamic approach

Volume 15, Issue 1

1 -- 12Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal. Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
13 -- 22Krishnaraj Bhat, K. R. Udaya Kumar Reddy, Ranjan Kumar H. S., Dindayal Mahto. A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography
23 -- 37Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammad Zarour, Kenza Meridji. A reference measurement framework of software security product quality (SPQNFSR)
38 -- 58Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi. A behavioural in-depth analysis of ransomware infection
59 -- 75Cengiz Acartürk, Murat Ulubay, Efe Erdur. Continuous improvement on maturity and capability of Security Operation Centres
76 -- 86Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang. Private feasible solution determination
87 -- 97Yanjun Li, Jie Peng, Chik-How Tan, Haibin Kan, Lijing Zheng. Further constructions of bent functions and their duals
98 -- 106Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee. An efficient lattice-based threshold signature scheme using multi-stage secret sharing
107 -- 116Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang. Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature
117 -- 130Ozgur Oksuz. Time-specific encrypted range query with minimum leakage disclosure
131 -- 146Yumei Li, Futai Zhang, Yinxia Sun. Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system