-
1
On the performance of non‐profiled side channel attacks based on deep learning techniques
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
2
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
4
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
5
Homomorphic signcryption with public plaintext‐result checkability
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
6
R‐DP: A risk‐adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
7
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
8
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
9
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
10
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
11
Lattice‐based cryptosystems in standardisation processes: A survey
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
12
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
13
Smart home: Keeping privacy based on Air‐Padding
Published 2021-03-01“…IET Information Security…”
Get full text
Article -
14
Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
15
DCDroid: An APK Static Identification Method Based on Naïve Bayes Classifier and Dual-Centrality Analysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
16
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
17
Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
18
T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
Published 2021-03-01“…IET Information Security…”
Get full text
Article -
19
Search framework for neutral bits and boomerangs in SHA‐1 collision attacks
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
20
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01“…IET Information Security…”
Get full text
Article