-
201
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
202
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
203
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
204
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
205
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
206
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
207
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
208
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
209
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
210
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
211
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
212
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
213
Further constructions of bent functions and their duals
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
214
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
215
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
216
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
217
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
218
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
219
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
220
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01“…IET Information Security…”
Get full text
Article