Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887
banner image
image of Volume 14, Issue 1
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 14, Issue 1, January 2020


Volume 14, Issue 1

January 2020

Show / Hide details
    • Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm
      MILP-aided bit-based division property for primitives with non-bit-permutation linear layers
      An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks
      Implementing confidential transactions with lattice techniques
      Correlation-based sequence alignment models for detecting masquerades in cloud computing
      Secure signal processing using fully homomorphic encryption
      How to build a vulnerability benchmark to overcome cyber security attacks
      Cube distinguisher extraction using division property in block ciphers
      Dynamic resource virtualisation method for survivability enhancement based on SDN
      Contextual-based approach to reduce false positives
      Secure hierarchical authentication protocol in VANET
      Specifications and improvements of LPN solving algorithms
      Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions
      New method for assets sensitivity calculation and technical risks assessment in the information systems
      Ways to merge two secret sharing schemes

Most viewed content

Article
content/journals/iet-ifs
Journal
5
Loading

Most cited content for this Journal

This is a required field
Please enter a valid email address