-
241
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
242
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
243
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
244
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
245
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
246
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
247
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
248
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
249
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
250
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
251
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
252
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
253
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
254
Crypto Deep Ring Topology Firewall in Sensitive Data Transmission and Retrieval in Cloud
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
255
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
256
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
257
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
258
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
259
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
260
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article