-
121
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
122
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
123
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
124
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
125
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
126
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
127
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
128
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
129
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
130
Tantalum airbridges for scalable superconducting quantum processors
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
131
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
132
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
133
Rehabilitation monitoring and assessment: a comparative analysis of feature engineering and machine learning algorithms on the UI-PRMD and KIMORE benchmark datasets
Published 2025-01-01“…Journal of Information and Telecommunication…”
Get full text
Article -
134
Faster-than-Clifford simulations of entanglement purification circuits and their full-stack optimization
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
135
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
136
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
137
Gate modulation of the hole singlet-triplet qubit frequency in germanium
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
138
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
139
Programmable quantum circuits in a large-scale photonic waveguide array
Published 2025-02-01“…npj Quantum Information…”
Get full text
Article -
140
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…IET Information Security…”
Get full text
Article