Your browser does not support JavaScript!
banner image
image of Volume 14, Issue 1
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 14, Issue 1, January 2020

Volume 14, Issue 1

January 2020

Show / Hide details
    • Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm
      MILP-aided bit-based division property for primitives with non-bit-permutation linear layers
      An efficient authentication and key agreement protocol for a group of vehicles devices in 5G cellular networks
      Implementing confidential transactions with lattice techniques
      Correlation-based sequence alignment models for detecting masquerades in cloud computing
      Secure signal processing using fully homomorphic encryption
      How to build a vulnerability benchmark to overcome cyber security attacks
      Cube distinguisher extraction using division property in block ciphers
      Dynamic resource virtualisation method for survivability enhancement based on SDN
      Contextual-based approach to reduce false positives
      Secure hierarchical authentication protocol in VANET
      Specifications and improvements of LPN solving algorithms
      Integral distinguishers for Grøstl-512 and Kupyna-512 permutation functions
      New method for assets sensitivity calculation and technical risks assessment in the information systems
      Ways to merge two secret sharing schemes

Most viewed content


Most cited content for this Journal

This is a required field
Please enter a valid email address