-
161
Towards practical intrusion detection system over encrypted traffic*
Published 2021-05-01“…IET Information Security…”
Get full text
Article -
162
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
163
Improved lattice enumeration algorithms by primal and dual reordering methods
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
164
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
165
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data‐flow analysis
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
166
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
167
Conditional differential analysis on the KATAN ciphers based on deep learning
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
168
Lattice‐based nominative signature using pseudorandom function
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
169
-
170
Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
171
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
172
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
173
A semantic‐based method for analysing unknown malicious behaviours via hyper‐spherical variational auto‐encoders
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
174
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
175
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
176
MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
177
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
178
Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
179
Towards an efficient LWE‐based fully homomorphic encryption scheme
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
180
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…IET Information Security…”
Get full text
Article