-
141
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
142
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
143
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
144
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
145
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
146
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
147
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
148
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
149
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
150
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
151
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
152
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
153
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
154
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
155
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
156
-
157
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
158
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
159
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
160
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…IET Information Security…”
Get full text
Article