-
101
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
102
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
103
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
104
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
105
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
106
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
107
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
108
Further constructions of bent functions and their duals
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
109
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
110
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
111
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
112
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
113
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
114
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
115
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
116
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
117
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
118
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
119
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
120
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article