-
1
Defending against social engineering attacks: A security pattern‐based analysis framework
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
2
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
3
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Published 2022-01-01“…IET Information Security…”
Get full text
Article -
4
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
5
A reference measurement framework of software security product quality (SPQNFSR)
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
6
Reversible data hiding in encrypted images with high payload
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
7
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
8
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
9
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
10
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…IET Information Security…”
Get full text
Article -
11
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…IET Information Security…”
Get full text
Article -
12
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
13
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
14
Unveiling the Neutral Difference and Its Automated Search
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
15
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
16
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
17
Revocable identity‐based matchmaking encryption in the standard model
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
18
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
19
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
20
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…IET Information Security…”
Get full text
Article