banner image
image of Volume 12, Issue 5
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 12, Issue 5, September 2018

Volume 12, Issue 5

September 2018

Show / Hide details
    • Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
      User-friendly XOR-based visual secret sharing by random grid
      Anomaly-based exploratory analysis and detection of exploits in android mediaserver
      Linear complexity of Legendre-polynomial quotients
      Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0
      Method for measuring the privacy level of pre-published dataset
      Smartphone passcode prediction
      RTTV: a dynamic CFI measurement tool based on TPM
      Sequential opening multi-jammers localisation in multi-hop wireless network
      Server notaries: a complementary approach to the web PKI trust model

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address