


default search action
IET Information Security, Volume 2024
Volume 2024, Number 1, 2024
- Jiamin Hu
, Zhonghua Shen, Kefei Chen, Yuying Liu, Qian Meng
, Fuqun Wang
, Yong Liu:
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT. - Haiyan Xiu
, Fang Ren
, Xinglong Xue, Dong Zheng:
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics. - Nobuyuki Sugio
:
Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming. - Vikas K. Soman
, V. Natarajan:
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud. - Ting Guo
, Abdugeni Abduxkur, Nurmamat Helil
:
Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation. - Lansheng Han
, Peng Chen, Wei Liao:
DCDroid: An APK Static Identification Method Based on Naïve Bayes Classifier and Dual-Centrality Analysis. - Bangli Wang, Yuxuan Jiang, You Liao, Zhen Li
:
DDoS-MSCT: A DDoS Attack Detection Method Based on Multiscale Convolution and Transformer. - Syed Imran Akhtar
, Abdul Rauf
, Muhammad Faisal Amjad, Ifra Batool:
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls. - Fusheng Wu
, Jinhui Liu, Yanbin Li
, Mingtao Ni
:
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory. - Ruolin Zhang
, Zejun Xiang
, Shasha Zhang
, Xiangyong Zeng
, Min Song
:
Optimized SM4 Hardware Implementations for Low Area Consumption. - Shiping Cai
, Kaizhan Lin
, Chang-An Zhao
:
Pairing Optimizations for Isogeny-Based Cryptosystems. - Jinxia Li
, Liwei Lu:
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data. - Gao Wang, Gaoli Wang, Siwei Sun:
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis. - Cheng-Yi Lee
, Zi-Yuan Liu
, Masahiro Mambo
, Raylin Tso
:
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates. - Ying-Ti Tsai
, Chung-Ho Wang, Yung-Chia Chang
, Lee-Ing Tong:
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model. - Chan Song
, Wenling Wu, Lei Zhang:
New Differential-Based Distinguishers for Ascon via Constraint Programming. - Adnan Kiliç
, Cansu Betin Onur
, Ertan Onur
:
PATS: Let Parties Have a Say in Threshold Group Key Sharing. - Yanxia Dui
, Hongchun Hu
:
Social Media Public Opinion Detection Using Multimodal Natural Language Processing and Attention Mechanisms. - Yaxin Cui
, Hong Xu
, Lin Tan
, Wenfeng Qi
:
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS. - Yang Wang
, Mingqiang Wang
:
Improved AB-CPREs with Revocability and HRA Security under LWE. - Jing Wang
, Xue Yuan
, Yingjie Xu
, Yudi Zhang
:
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs. - Saranya N.
, Anandakumar Haldorai
:
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution. - Selvakumar Shanmugam
, Rajesh Natarajan
, H. L. Gururaj
, Francesco Flammini
, Badria Sulaiman Alfurhood
, Anitha Premkumar
:
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services. - Shaoxuan Zhang
, Chun Guo
, Qingju Wang:
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations. - Zheng Wu
, Lin Ding
, Zhengting Li
, Xinhai Wang
, Ziyu Guan
:
New Practical Attacks on GEA-1 Based on a New-Found Weakness. 1-12 - Momeng Liu
, Yupu Hu
, Qiqi Lai
, Shanshan Zhang
, Huiwen Jia
, Wen Gao
, Baocang Wang
:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. 1-16 - Bing Li
, Mingxuan Zheng
, Maode Ma
:
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking. 1-21 - Xiaohui Yang, Jing Liu
:
HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes. 1-14 - Lin Wang
, Yang Wang
, Huiwen Jia
:
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption. 1-20 - Wei Gu
, Hongyan Xing
, Tianhao Hou
:
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling. 1-12 - Bo Mei
, Zhengbin Zhu
, Peijie Li
, Bo Zhao
:
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer. 1-15 - Lei Zhao, Zhizhi Liu, Sixing Wu
, Wei Chen, Liwen Wu
, Bin Pu
, Shaowen Yao:
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent. 1-11 - Wenya Li
, Kai Zhang
, Bin Hu:
Automated Differential-Linear Cryptanalysis for AND-RX Ciphers. 1-14 - Canling Wang, Wei Wu, Fulong Chen
, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao:
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing. 1-16 - Shiwei Chen
, Ting Cui
, Chenhui Jin
, Congjun Wang
:
A Second Preimage Attack on the XOR Hash Combiner. 1-7 - Bohan Wang
, Qian Sui, Fanjie Ji
, Chun Guo
, Weijia Wang
:
Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition. 1-16 - Jingyu Ning
, Zhenhua Tan
, Kaibing Zhang
, Weizhong Ye
:
Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets. 1-12 - Lin Wang
:
Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard. 1-17 - Yanyan Zhou
, Senpeng Wang
, Bin Hu:
MILP/MIQCP-Based Fully Automatic Method of Searching for Differential-Linear Distinguishers for SIMON-Like Ciphers. 1-39 - Botao Liu
, Ming Tang
:
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes. 1-17 - Xiansheng Cao
, Junfeng Wang
, Peng Wu
, Zhiyang Fang
:
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives. 1-15 - Guangqiu Lv
, Chenhui Jin
, Zhen Shi
, Ting Cui
:
Unveiling the Neutral Difference and Its Automated Search. 1-15 - Yixian Liu
, Yupeng Dai
:
Deep Learning in Cybersecurity: A Hybrid BERT-LSTM Network for SQL Injection Attack Detection. 1-16 - Lin Jiao
, Yongqiang Li, Yonglin Hao, Xinxin Gong:
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA. 1-11 - Armita Kazeminajafabadi
, Mahdi Imani
:
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach. 1-20

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.