Your browser does not support JavaScript!
banner image
image of IET Information Security
Online ISSN 1751-8717
Print ISSN 1751-8709

IET Information Security

eFirst articles

eFirst publishing provides access to all final version articles as soon as they are ready for publication and in advance of the whole issue being published online, in print or on Xplore.

Show / Hide details

12 items found

Items per page 20 | 50 | 100
  • Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
  • Achieving secure and convenient WLAN sharing in personal
  • Economic feasibility study for stealthy socialbot network establishment
  • P2 KASE A2—privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation
  • Post-quantum protocol for computing set intersection cardinality with linear complexity
  • C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic
  • SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby
  • Further study on constructing bent functions outside the completed Maiorana–McFarland class
  • A More Realistic Analysis of Mass Surveillance - Security in Multi-Surveillant Settings
  • Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level
  • A Pairing Free Identity Based Aggregate Signcryption Scheme
  • An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-based Accumulator
Items per page 20 | 50 | 100

Most viewed content for this Journal


Most cited content for this Journal

This is a required field
Please enter a valid email address