Your browser does not support JavaScript!
banner image
image of Volume 14, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 14, Issue 3, May 2020

Volume 14, Issue 3

May 2020

Show / Hide details
    • Faster privacy-preserving location proximity schemes for circles and polygons
      Fully invisible protean signatures schemes
      Impact of the modulus switching technique on some attacks against learning problems
      Complexity of statistical attacks on QC-LDPC code-based cryptosystems
      Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
    • Privacy-preserving constrained spectral clustering algorithm for large-scale data sets
      Data availability improvement in peer-to-peer online social networks
      Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice
      ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis

Most viewed content


Most cited content for this Journal

This is a required field
Please enter a valid email address