Journal: IET Information Security

Volume 9, Issue 6

305 -- 312Khaled Salah, Aslam Chaudary. Modelling and analysis of rule-based network security middleboxes
313 -- 320Suleiman Y. Yerima, Sakir Sezer, Igor Muttik. High accuracy android malware detection using ensemble learning
321 -- 327Zhenqing Shi, Bin Zhang 0003, Dengguo Feng. Practical-time related-key attack on Hummingbird-2
328 -- 333Riham AlTawy, Amr M. Youssef. Watch your constants: malicious Streebog
334 -- 343Walid I. Khedr, Mahmoud I. Abdalla, Asmaa A. Elsheikh. Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
344 -- 353Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu. Exploring risk flow attack graph for security risk assessment
354 -- 364Gaoli Wang, Hongbo Yu. Improved cryptanalysis on RIPEMD-128
365 -- 373Ali Al-Haj, Gheith A. Abandah, Noor Hussein. Crypto-based algorithms for secured medical image transmission
374 -- 379Wei Wang 0012, Yongzhong He, Jiqiang Liu, Sylvain Gombault. Constructing important features from massive network traffic for lightweight intrusion detection
380 -- 386Lin Cheng, Qiaoyan Wen. Cryptanalysis and improvement of a certificateless partially blind signature

Volume 9, Issue 5

257 -- 265Fuzhi Zhang, Shuangxia Sun, Huawei Yi. Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator
266 -- 276Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu. Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192
277 -- 283Le Dong, Yanling Wang, Wenling Wu, Jian Zou. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes
284 -- 287Myong-Son Sin, Ryul Kim. Some new results on equivalency of collusion-secure properties for Reed-Solomon codes
288 -- 293Zhuohua Liu, Chuankun Wu. Privacy of a randomised skip lists-based protocol
294 -- 301Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Biclique cryptanalysis of the full-round KLEIN block cipher

Volume 9, Issue 4

203 -- 208Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim. Hijacking the Vuze BitTorrent network: all your hop are belong to us
209 -- 218Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun. Differential fault analysis on LED using Super-Sbox
219 -- 222Weijia Xue, Xuejia Lai. Impossible differential cryptanalysis of MARS-like structures
223 -- 233Amir Salah Elsafrawey, Emad S. Hassan, Moawad I. Dessouky. Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks
234 -- 239Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
240 -- 247Keshnee Padayachee. Aspectising honeytokens to contain the insider threat
248 -- 255Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami. Distributed key generation protocol with hierarchical threshold access structure

Volume 9, Issue 3

149 -- 157Kwangsu Lee, Dong-Hoon Lee. Adaptively secure broadcast encryption under standard assumptions with better efficiency
158 -- 166Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. Efficient revocable certificateless encryption against decryption key exposure
167 -- 178Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
179 -- 184Hadi Soleimany. Self-similarity cryptanalysis of the block cipher ITUbee
185 -- 193Zuhua Shao, Yipeng Gao. Practical verifiably encrypted signature based on Waters signatures
194 -- 201Liaojun Pang, Lu Gao, Huixian Li, YuMin Wang. Anonymous multi-receiver ID-based signcryption scheme

Volume 9, Issue 2

91 -- 99Dionysis Kefallinos, Efstathios D. Sykas. 'A public key infrastructure model for privacy-enhancing general purpose eIDs'
100 -- 107Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun. Novel and practical scheme based on secret sharing for laptop data protection
108 -- 118Huaqun Wang. Anonymous multi-receiver remote data retrieval for pay-TV in public clouds
119 -- 126S. Maria Celestin Vigila, K. Muneeswaran, W. T. B. A. Antony. Biometric security system over finite field for mobile applications
127 -- 135Hong Xu, Yonghui Zheng, Xuejia Lai. Construction of perfect diffusion layers from linear feedback shift registers
136 -- 147Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao. RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility

Volume 9, Issue 1

1 -- 13Wei He, Shivam Bhasin, Andrés Otero, Tarik Graba, Eduardo de la Torre, Jean-Luc Danger. Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis
14 -- 23R. Pushpa Lakshmi, A. Vincent Antony Kumar. Parallel key management scheme for mobile ad hoc network based on traffic mining
24 -- 31Fuzhi Zhang, Quanqiang Zhou. Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network
32 -- 42Baodong Qin, Shengli Liu, Kefei Chen. Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
43 -- 49Hui Cui, Yi Mu, Man Ho Au. Proof of retrievability with public verifiability resilient against related-key attacks
50 -- 58Alawi A. Al-saggaf, Lahouari Ghouti. Efficient abuse-free fair contract-signing protocol based on an ordinary crisp commitment scheme
59 -- 72Jiangxiao Zhang, Hua Guo, Zhoujun Li, Chang Xu. Transferable conditional e-cash with optimal anonymity in the standard model
73 -- 80Fatemeh Raji, Mohammad Davarpanah Jazi, Ali Miri. PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability
81 -- 89Rafal Leszczyna. Approaching secure industrial control systems