Your browser does not support JavaScript!
banner image
image of Volume 10, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 10, Issue 3, May 2016

Volume 10, Issue 3

May 2016

Show / Hide details
    • Empirical analysis of Tor Hidden Services
      Authenticating multi-dimensional query results in outsourced database
      Border gateway protocol graph: detecting and visualising internet routing anomalies
      Supervised approach for detecting average over popular items attack in collaborative recommender systems
      Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers
      Key recovery on several matrix public-key encryption schemes
      Covert communications through mobile voice channels

Most viewed content


Most cited content for this Journal

This is a required field
Please enter a valid email address