英国工程技术学会
期刊
会议
图书
作者:Matej Zuzčák , Petr Bujok
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.435-447IET
摘要:This study studies the influence of country attributes on the number of secure shell attacks originating from it detected by the author's honeynet. Four statistical models are described, based on three sources of data from various countries. The studied attributes of the countrie...
作者:Tianfeng Sun , Bin Hu , Yang Yang
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.515-518IET
摘要:Here, the authors correct the proof in the reference when explaining that the produced plateaued functions have no non-zero linear structures. Moreover, a new class of plateaued functions with the best algebraic degree is given.
作者:Ling-Chen Li , Wen-Ling Wu , Lei Zhang ...
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.479-485IET
摘要:Based on the method of the H-representation of the convex hull, the linear inequalities of all possible differential patterns of 4-bit S-boxes in the mix integer linear programming (MILP) model can be generated easily by the SAGE software. Whereas this method cannot be apply...
作者:Morteza Noferesti , Rasool Jalili
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.486-495IET
摘要:High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. The infinite stream of incoming traffic forms a dynamic environment with unexpected changes, which requires ana...
作者:David Nuñez , Isaac Agudo , Javier Lopez
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.498-507IET
摘要:Escrowed decryption schemes (EDSs) are public-key encryption schemes with an escrowed decryption functionality that allows authorities to decrypt encrypted messages under investigation, following a protocol that involves a set of trusted entities called ‘custodians’; only if...
作者:Hossein Arabnezhad-Khanoki , Babak Sadeghiyan , Josef Pieprzyk
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.448-458IET
摘要:Algebraic analysis of block ciphers aims at finding the secret key by solving a collection of polynomial equations that describe the internal structure of a cipher for chosen observations of plaintext/ciphertext pairs. Although algebraic attacks are addressed for cryptanalys...
作者:Parvin Rastegari , Mohammad Dakhilalian , Mehdi Berenjkoub ...
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.459-468IET
摘要:In a designated verifier signature (DVS) scheme, the validity of the signature can only be checked by a designated entity chosen by the signer. Furthermore, the designated entity cannot convince a third party that the signature is generated by the signer. A multi-designated ...
作者:Jin-Yuan Wang , Sheng-Hong Lin , Wei Cai ...
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.420-425IET
摘要:Different from conventional key-based cryptography schemes, physical-layer security (PLS) techniques have drawn much attention recently to realise unconditional security from the information theory perspective. As an important performance metric in PLS, the ergodic secrecy rate (...
作者:Bagher Bagherpour , Ali Zaghian , Mahdi Sajadieh
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.508-514IET
摘要:The $\Sigma $ Σ -protocols for homomorphism relations are one of the cryptographic protocols which are used to prove knowledge of homomorphism relations. The Schnorr protocol is one of the most famous $\Sigma $ Σ ...
作者:Yanwei Zhou , Bo Yang , Yi Mu ...
来源:[J].IET Information Security, 2019, Vol.13 (5), pp.426-434IET
摘要:Leakage of private information has become a threat to the security of computing systems. It has become a common security requirement that a cryptography scheme should withstand various leakage attacks, even the continuous leakage attacks. However, in the current constructions on ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×