IET Information Security

Table of Contents

Table of Contents

  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 2498245
  • - Research Article

HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes

Xiaohui Yang | Jing Liu
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 2023349
  • - Research Article

DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer

Bo Mei | Zhengbin Zhu | ... | Bo Zhao
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5565950
  • - Research Article

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

Yixian Liu | Yupeng Dai
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 7457517
  • - Research Article

Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA

Lin Jiao | Yongqiang Li | ... | Xinxin Gong
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 1230891
  • - Research Article

A Second Preimage Attack on the XOR Hash Combiner

Shiwei Chen | Ting Cui | ... | Congjun Wang
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 4313185
  • - Research Article

VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives

Xiansheng Cao | Junfeng Wang | ... | Zhiyang Fang
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 6616095
  • - Research Article

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

Bing Li | Mingxuan Zheng | Maode Ma
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 3219604
  • - Research Article

Deciding Irreducibility/Indecomposability of Feedback Shift Registers Is NP-Hard

Lin Wang
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 6674019
  • - Research Article

New Practical Attacks on GEA-1 Based on a New-Found Weakness

Zheng Wu | Lin Ding | ... | Ziyu Guan
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 2850804
  • - Research Article

MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling

Wei Gu | Hongyan Xing | Tianhao Hou
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 6052651
  • - Research Article

Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets

Jingyu Ning | Zhenhua Tan | ... | Weizhong Ye
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5513292
  • - Research Article

Dual-Mode Encryption for UC-Secure String OT from Learning with Errors

Momeng Liu | Yupu Hu | ... | Baocang Wang
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5559522
  • - Research Article

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

Canling Wang | Wei Wu | ... | Chuanxin Zhao
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 2786399
  • - Research Article

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

Lin Wang | Yang Wang | Huiwen Jia
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5544999
  • - Research Article

Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition

Bohan Wang | Qian Sui | ... | Weijia Wang
IET Information Security
Publishing Collaboration
More info
IET logo
 Journal metrics
See full report
Acceptance rate13%
Submission to final decision86 days
Acceptance to publication37 days
CiteScore4.000
Journal Citation Indicator0.370
Impact Factor1.4
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.