-
61
Improved AB-CPREs with Revocability and HRA Security under LWE
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
62
New attacks against reduced Rijndael‐160
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
63
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
64
New indifferentiability security proof of MDPH hash function
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
65
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
66
An interpretable semi‐supervised system for detecting cyberattacks using anomaly detection in industrial scenarios
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
67
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
68
Automatic Search of Differential Characteristics and Improved Differential Cryptanalysis for PRINCE, QARMA, and MANTIS
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
69
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
70
Yoyo trick on type‐II generalised Feistel networks
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
71
Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
72
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
73
-
74
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
75
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
76
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
77
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
78
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
79
Using WPCA and EWMA Control Chart to Construct a Network Intrusion Detection Model
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
80
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01“…IET Information Security…”
Get full text
Article