banner image
image of Volume 13, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 13, Issue 3, May 2019

Volume 13, Issue 3

May 2019

Show / Hide details
    • Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model
      Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours
      HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering
      Event reconstruction using temporal pattern of file system modification
      Security and fault tolerance evaluation of TMR–QDI circuits
      Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic
      Fast Montgomery modular multiplier for Rivest–Shamir–Adleman cryptosystem
      Impact assessment of policy expressiveness of an optimised access control model for smart sensors
      Base for algebraic cryptanalysis based on combined representation of S-box
      Re-definable access control over outsourced data in cloud storage systems
      Analysis of dynamic code updating in Android with security perspective
      Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
      Detecting LDoS attack bursts based on queue distribution

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address