banner image
image of Volume 9, Issue 6
Online ISSN 1751-8717 Print ISSN 1751-8709

IET Information Security

Volume 9, Issue 6, November 2015

Volume 9, Issue 6

November 2015

Show / Hide details
    • Modelling and analysis of rule-based network security middleboxes
      High accuracy android malware detection using ensemble learning
      Practical-time related-key attack on Hummingbird-2
      Watch your constants: malicious Streebog
      Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network
      Exploring risk flow attack graph for security risk assessment
      Improved cryptanalysis on RIPEMD-128
      Crypto-based algorithms for secured medical image transmission
      Constructing important features from massive network traffic for lightweight intrusion detection
      Cryptanalysis and improvement of a certificateless partially blind signature

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address