-
81
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
82
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
83
Bit‐level evaluation of piccolo block cipher by satisfiability problem solver
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
84
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
85
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
86
TR‐AKA: A two‐phased, registered authentication and key agreement protocol for 5G mobile networks
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
87
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
88
Adaptive and survivable trust management for Internet of Things systems
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
89
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
90
A new quantum cryptanalysis method on block cipher Camellia
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
91
A hybrid model for fake news detection: Leveraging news content and user comments in fake news
Published 2021-03-01“…IET Information Security…”
Get full text
Article -
92
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
93
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
94
Cryptanalysis of Keyword Confidentiality in a Searchable Public-Key Encryption Scheme Against Malicious Server
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
95
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
96
A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
97
Two-Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
98
Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
99
Boosting the Transferability of Ensemble Adversarial Attack via Stochastic Average Variance Descent
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
100
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article