-
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. IET Inf. Secur. (IF 1.4) Pub Date : 2022-07-04 Ali F Al-Qahtani,Stefano Cresci
The COVID-19 pandemic coincided with an equally-threatening scamdemic: a global epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during the pandemic sparked a torrent of research to investigate cyber-attacks and to propose solutions and countermeasures. Within the scamdemic, phishing was by far the most frequent type of attack. This survey paper reviews, summarises, compares
-
AI bot to detect fake COVID-19 vaccine certificate. IET Inf. Secur. (IF 1.4) Pub Date : 2022-05-11 Muhammad Arif,Shermin Shamsudheen,F Ajesh,Guojun Wang,Jianer Chen
As the world is now fighting against rampant virus COVID-19, the development of vaccines on a large scale and making it reach millions of people to be immunised has become quintessential. So far 40.9% of the world got vaccinated. Still, there are more to get vaccinated. Those who got vaccinated have the chance of getting the vaccine certificate as proof to move, work, etc., based on their daily requirements
-
R‐D P : A risk‐adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things IET Inf. Secur. (IF 1.4) Pub Date : 2022-04-29 Lisha Shuai,Jiamin Zhang,Yu Cao,Min Zhang,Xiaolong Yang
-
Towards an efficient LWE‐based fully homomorphic encryption scheme IET Inf. Secur. (IF 1.4) Pub Date : 2022-04-28 Uddipana Dowerah,Srinivasan Krishnaswamy
-
Reversible data hiding in encrypted images with high payload IET Inf. Secur. (IF 1.4) Pub Date : 2022-04-25 Dawen Xu
-
Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers IET Inf. Secur. (IF 1.4) Pub Date : 2022-03-29 Jinyu Lu,Yunwen Liu,Tomer Ashur,Bing Sun,Chao Li
-
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase IET Inf. Secur. (IF 1.4) Pub Date : 2022-03-22 Yongseong Lee,Jinkeon Kang,Donghoon Chang,Seokhie Hong
-
New indifferentiability security proof of MDPH hash function IET Inf. Secur. (IF 1.4) Pub Date : 2022-03-12 Chun Guo,Tetsu Iwata,Kazuhiko Minematsu
-
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions IET Inf. Secur. (IF 1.4) Pub Date : 2022-03-09 Yuze Wang,Peng Liu,Yingtao Jiang
-
On the upper bound of squared correlation of SIMON‐like functions and its applications IET Inf. Secur. (IF 1.4) Pub Date : 2022-02-21 Zhengbin Liu,Yongqiang Li,Lin Jiao,Mingsheng Wang
-
Beyond full‐bit secure authenticated encryption without input‐length limitation IET Inf. Secur. (IF 1.4) Pub Date : 2022-01-18 Akiko Inoue
-
TR‐AKA: A two‐phased, registered authentication and key agreement protocol for 5G mobile networks IET Inf. Secur. (IF 1.4) Pub Date : 2021-12-24 Yibing Liu,Lijun Huo,Gang Zhou
-
Efficient constructions for large‐state block ciphers based on AES New Instructions IET Inf. Secur. (IF 1.4) Pub Date : 2021-12-23 Rentaro Shiba,Kosei Sakamoto,Takanori Isobe
-
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map IET Inf. Secur. (IF 1.4) Pub Date : 2021-12-20 Jiseung Kim,Changmin Lee
-
PCA mix‐based Hotelling's T 2 multivariate control charts for intrusion detection system IET Inf. Secur. (IF 1.4) Pub Date : 2021-12-03 Mo Shaohui,Gulanbaier Tuerhong,Mairidan Wushouer,Tuergen Yibulayin
-
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning IET Inf. Secur. (IF 1.4) Pub Date : 2021-11-27 Huanruo Li,Yunfei Guo,Penghao Sun,Yawen Wang,Shumin Huo
-
On robust strong‐non‐interferent low‐latency multiplications IET Inf. Secur. (IF 1.4) Pub Date : 2021-11-24 Maria Chiara Molteni,Jürgen Pulkus,Vittorio Zaccaria
-
Quantum‐resistant anonymous identity‐based encryption with trable identities IET Inf. Secur. (IF 1.4) Pub Date : 2021-11-23 Zi‐Yuan Liu,Yi‐Fan Tseng,Raylin Tso,Masahiro Mambo,Yu‐Chi Chen
-
Authorisation inconsistency in IoT third‐party integration IET Inf. Secur. (IF 1.4) Pub Date : 2021-10-15 Jiongyi Chen,Fenghao Xu,Shuaike Dong,Wei Sun,Kehuan Zhang
-
LDoS attack detection method based on traffic classification prediction IET Inf. Secur. (IF 1.4) Pub Date : 2021-09-29 Liang Liu,Yue Yin,Zhijun Wu,Qingbo Pan,Meng Yue
-
A deep learning‐based attack on text CAPTCHAs by using object detection techniques IET Inf. Secur. (IF 1.4) Pub Date : 2021-09-24 Jiawei Nian,Ping Wang,Haichang Gao,Xiaoyan Guo
-
Cryptanalysis of a white‐box SM4 implementation based on collision attack IET Inf. Secur. (IF 1.4) Pub Date : 2021-09-20 Rusi Wang,Hua Guo,Jiqiang Lu,Jianwei Liu
-
Inhibiting crypto‐ransomware on windows platforms through a honeyfile‐based approach with R‐Locker IET Inf. Secur. (IF 1.4) Pub Date : 2021-09-18 José Antonio Gómez‐Hernández,Raúl Sánchez‐Fernández,Pedro García‐Teodoro
-
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC IET Inf. Secur. (IF 1.4) Pub Date : 2021-09-14 Rentaro Shiba,Kosei Sakamoto,Fukang Liu,Kazuhiko Minematsu,Takanori Isobe
-
DPLQ: Location‐based service privacy protection scheme based on differential privacy IET Inf. Secur. (IF 1.4) Pub Date : 2021-08-20 Qingyun Zhang,Xing Zhang,Mingyue Wang,Xiaohui Li
-
Fault attacks on authenticated encryption modes for GIFT IET Inf. Secur. (IF 1.4) Pub Date : 2021-08-04 Shuai Liu,Jie Guan,Bin Hu
-
Security notions for stateful signature schemes IET Inf. Secur. (IF 1.4) Pub Date : 2021-08-02 Quan Yuan,Mehdi Tibouchi,Masayuki Abe
-
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited IET Inf. Secur. (IF 1.4) Pub Date : 2021-07-22 Huiwen Jia,Yupu Hu,Chunming Tang
-
Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations IET Inf. Secur. (IF 1.4) Pub Date : 2021-07-20 TanPing Zhou,NingBo Li,QiQi Lai,XiaoYuan Yang,YiLiang Han,WenChao Liu
-
New attacks against reduced Rijndael‐160 IET Inf. Secur. (IF 1.4) Pub Date : 2021-07-10 Xiaoli Dong,Yongzhuang Wei
-
A new quantum cryptanalysis method on block cipher Camellia IET Inf. Secur. (IF 1.4) Pub Date : 2021-07-06 Yanjun Li,Hao Lin,Meng Liang,Ying Sun
Symmetric cryptography is expected to be quantum safe when long-term security is needed. Kuwakado and Morii gave a 3-round quantum distinguisher of the Feistel cipher based on Simon's algorithm. However, the quantum distinguisher without considering the specific structure of the round function is not accurate enough. A new quantum cryptanalysis method for Feistel structure is studied here. It can make
-
Yoyo trick on type‐II generalised Feistel networks IET Inf. Secur. (IF 1.4) Pub Date : 2021-06-20 Tao Hou,Ting Cui
-
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants IET Inf. Secur. (IF 1.4) Pub Date : 2021-06-05 Wonhee Cho,Jiseung Kim,Changmin Lee
-
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance IET Inf. Secur. (IF 1.4) Pub Date : 2021-06-04 Xingting Dong,Yupu Hu,Baocang Wang,Momeng Liu,Wen Gao
-
Is low‐rate distributed denial of service a great threat to the Internet? IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-10 Ming Chen,Jing Chen,Xianglin Wei,Bing Chen
-
Feature selection‐based android malware adversarial sample generation and detection method IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-07 Xiangjun Li,Ke Kong,Su Xu,Pengtao Qin,Daojing He
-
Adaptive and survivable trust management for Internet of Things systems IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-07 Farhana Jabeen,Zia‐ur‐Rehman Khan,Zara Hamid,Zobia Rehman,Abid Khan
-
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018 IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-02 Dachao Wang,Baocang Wang,Yuan Ping
-
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-02 Daniel Cervantes‐Vázquez,Eduardo Ochoa‐Jiménez,Francisco Rodríguez‐Henríquez
-
Homomorphic signcryption with public plaintext‐result checkability IET Inf. Secur. (IF 1.4) Pub Date : 2021-05-02 Shimin Li,Bei Liang,Aikaterini Mitrokotsa,Rui Xue
-
Lattice‐based nominative signature using pseudorandom function IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-26 Meenakshi Kansal,Ratna Dutta,Sourav Mukhopadhyay
-
Asymptotically ideal Chinese remainder theorem ‐based secret sharing schemes for multilevel and compartmented access structures IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-20 Ferucio Laurenţiu Ţiplea,Constantin Cătălin Drăgan
-
Indifferentiable hash functions in the standard model IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-16 Juha Partala
-
Joint security and performance improvement in multilevel shared caches IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-14 Amin Sarihi,Ahmad Patooghy,Mahdi Amininasab,Mohammad Shokrolah Shirazi,Abdel‐Hameed A. Badawy
-
Memory‐constrained implementation of lattice‐based encryption scheme on standard Java Card platform IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-14 Ye Yuan,Kazuhide Fukushima,Junting Xiao,Shinsaku Kiyomoto,Tsuyoshi Takagi
Memory-constrained devices, including widely used smart cards, require resisting attacks by the quantum computers. Lattice-based encryption scheme possesses high efficiency and reliability which could run on small devices with limited storage capacity and computation resources such as IoT sensor nodes or smart cards. We present the first implementation of a lattice-based encryption scheme on the standard
-
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-10 Foteini Baldimtsi,Aggelos Kiayias,Katerina Samari
-
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment IET Inf. Secur. (IF 1.4) Pub Date : 2021-04-01 Shivangi Shukla,Sankita J. Patel
-
How not to secure wireless sensor networks: a plethora of insecure polynomial‐based key pre‐distribution schemes IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-23 Chris J Mitchell
Three closely-related polynomial-based group key pre-distribution schemes have recently been proposed, aimed specifically at wireless sensor networks. The schemes enable any subset of a predefined set of sensor nodes to establish a shared secret key without any communications overhead. It is claimed that these schemes are both secure and lightweight, i.e. making them particularly appropriate for network
-
Towards practical intrusion detection system over encrypted traffic* IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-21 Sébastien Canard,Chaoyun Li
-
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-17 Manman Li,Shaozhen Chen
-
A hybrid model for fake news detection: Leveraging news content and user comments in fake news IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-01 Marwan Albahar
-
T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-01 Mohamed Hammad,Nabil Hewahi,Wael Elmedany
-
Detecting human attacks on text‐based CAPTCHAs using the keystroke dynamic approach IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-01 Suliman A. Alsuhibany,Latifah A. Alreshoodi
-
Smart home: Keeping privacy based on Air‐Padding IET Inf. Secur. (IF 1.4) Pub Date : 2021-03-01 Quanlong Zhu,Chao Yang,Yu Zheng,Jianfeng Ma,Hui Li,Junwei Zhang,Jiajie Shao
-
Analysis on Aigis‐Enc: Asymmetrical and symmetrical IET Inf. Secur. (IF 1.4) Pub Date : 2021-01-03 Yupu Hu,Siyue Dong,Xingting Dong
Aigis-Enc is an encryption algorithm based on asymmetrical LWE. In this algorithm, the compression process is utilized during both key generation and encryption (which is equivalent to add some LWR noise). Then encapsulation is realized by FO transformation. It is well known that FO transformation is not considered for discussing CPA security. On the other hand, since the security reduction of LWR
-
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature IET Inf. Secur. (IF 1.4) Pub Date : 2020-12-30 Guanhao Xue,Baocang Wang,Quanbo Qu,Weidong Zhang
-
A behavioural in‐depth analysis of ransomware infection IET Inf. Secur. (IF 1.4) Pub Date : 2020-12-30 Yassine Lemmou,Jean‐Louis Lanet,El Mamoun Souidi
-
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system IET Inf. Secur. (IF 1.4) Pub Date : 2020-12-29 Yumei Li,Futai Zhang,Yinxia Sun
-
Time‐specific encrypted range query with minimum leakage disclosure IET Inf. Secur. (IF 1.4) Pub Date : 2020-12-29 Ozgur Oksuz
-
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing IET Inf. Secur. (IF 1.4) Pub Date : 2020-12-28 Hossein Pilaram,Taraneh Eghlidos,Rahim Toluee