


default search action
The Computer Journal, Volume 62
Volume 62, Number 1, January 2019
Original Articles
- Nazmun Naher, Tanzima Hashem  : :
 Think Ahead: Enabling Continuous Sharing of Location Data in Real-Time with Privacy Guarantee. 1-19
- Shmuel T. Klein  , Dana Shapira , Dana Shapira : :
 Context Sensitive Rewriting Codes for Flash Memory†. 20-29
- Zbynek Krivka, Jirí Kucera, Alexander Meduna  : :
 Jumping Pure Grammars. 30-41
- Chengcheng Mou, Shaoping Chen, Yi-Cheng Tu: 
 A Comparative Study of Dual-Tree Algorithms for Computing Spatial Distance Histograms. 42-62
- Yuan Lin, Zhongzhi Zhang  : :
 Non-Backtracking Centrality Based Random Walk on Networks. 63-80
- Weiwei Liu, Chong Jiang, Ji-Bo Wang, Yuan-Yuan Lu: 
 Single-machine scheduling with simultaneous considerations of resource allocation and deteriorating jobs. 81-89
- Yu Ti, Ming Xu, Chong Jiang, Ji-Bo Wang, Xiao-Yuan Wang: 
 No-wait resource allocation flowshop scheduling with learning effect under limited cost availability. 90-96
- Abel Cabrera Martínez  , Frank Angel Hernández Mira , Frank Angel Hernández Mira , José M. Sigarreta Almira , José M. Sigarreta Almira , Ismael González Yero , Ismael González Yero : :
 On Computational and Combinatorial Properties of the Total Co-independent Domination Number of Graphs. 97-108
- Vanderson Hafemann Fragal, Adenilso Simão  , Mohammad Reza Mousavi, Uraz Cengiz Türker: , Mohammad Reza Mousavi, Uraz Cengiz Türker:
 Extending HSI Test Generation Method for Software Product Lines. 109-129
- Dong-Yuh Yang, Yi-Chun Cho: 
 Analysis of the N-policy GI/M/1/K Queueing Systems with Working Breakdowns and Repairs. 130-143
- Shu-Li Zhao, Rong-Xia Hao  : :
 The Generalized Three-Connectivity of Two Kinds of Cayley Graphs. 144-149
- Bing Zhu, Kenneth W. Shum, Hui Li  : :
 On the Duality and File Size Hierarchy of Fractional Repetition Codes. 150-160
Volume 62, Number 2, February 2019
Original Articles
- Bruno Guazzelli Batista, Bruno Tardiole Kuehne  , Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto , Dionisio Machado Leite Filho, Maycon Leone Maciel Peixoto : :
 Security Overhead on a Service with Automatic Resource Management: A Performance Analysis. 161-173
- Salman Taherizadeh, Vlado Stankovski  : :
 Dynamic Multi-level Auto-scaling Rules for Containerized Applications. 174-197
- Yeim-Kuan Chang, Han-Chen Chen: 
 Fast Packet Classification using Recursive Endpoint-Cutting and Bucket Compression on FPGA. 198-214
- Fan Zhang, Tao Jing, Yan Huo, Kai-Wei Jiang: 
 Joint Optimization of Spectrum Sensing and Transmit Power in Energy Harvesting Cognitive Radio Sensor Networks. 215-230
- Matthieu Barjon, Arnaud Casteigts, Serge Chaumette, Colette Johnen  , Yessin M. Neggaz: , Yessin M. Neggaz:
 Maintaining a Distributed Spanning Forest in Highly Dynamic Networks. 231-246
- Jianzhong Huang  , Panping Zhou, Xiao Qin , Panping Zhou, Xiao Qin , Yanqun Wang, Changsheng Xie: , Yanqun Wang, Changsheng Xie:
 Optimizing Erasure-Coded Data Archival for Replica-Based Storage Clusters. 247-262
- C. BrijilalRuban  , B. Paramasivan: , B. Paramasivan:
 Cluster-Based Secure Communication and Certificate Revocation Scheme for VANET. 263-275
- Neetesh Kumar, Deo Prakash Vidyarthi: 
 A Hybrid Heuristic for Load-Balanced Scheduling of Heterogeneous Workload on Heterogeneous Systems. 276-291
- Ahmad A. Hiasat  , Leonel Sousa , Leonel Sousa : :
 On the Design of RNS Inter-Modulo Processing Units for the Arithmetic-Friendly Moduli Sets {2n+k, 2n - 1, 2n+1 - 1}. 292-300
- Xinjian Luo, Xiaofeng Gao, Guihai Chen  : :
 Accelerate Data Retrieval by Multi-Dimensional Indexing in Switch-Centric Data Centers. 301-320
Volume 62, Number 3, March 2019
Original Articles
- Jesús Manuel Almendros-Jiménez  , Antonio Becerra-Terón , Antonio Becerra-Terón , Manuel Torres: , Manuel Torres:
 Integrating and Querying OpenStreetMap and Linked Geo Open Data. 321-345
- Raphael Angulu  , Jules-Raymond Tapamo, Aderemi Oluyinka Adewumi: , Jules-Raymond Tapamo, Aderemi Oluyinka Adewumi:
 Age-Group Estimation Using Feature and Decision Level Fusion. 346-358
- Ximing Li, Ang Zhang, Changchun Li, Lantian Guo, Wenting Wang, Jihong Ouyang: 
 Relational Biterm Topic Model: Short-Text Topic Modeling using Word Embeddings. 359-372
- Chris J. Mitchell  : :
 Security issues in a group key establishment protocol. 373-376
- Asieh Ghanbarpour  , Hassan Naderi , Hassan Naderi : :
 A Model-based Keyword Search Approach for Detecting Top-k Effective Answers. 377-393
- Michael Scriney  , Suzanne McCarthy, Andrew McCarren , Suzanne McCarthy, Andrew McCarren , Paolo Cappellari, Mark Roantree , Paolo Cappellari, Mark Roantree : :
 Automating Data Mart Construction from Semi-structured Data Sources. 394-413
- Hafiz Tayyeb Javed, Mirza Omer Beg, Hasan Mujtaba, Hammad Majeed, Muhammad Asim  : :
 Fairness in Real-Time Energy Pricing for Smart Grid Using Unsupervised Learning. 414-429
- Weihua Li  , Quan Bai , Quan Bai , Minjie Zhang , Minjie Zhang : :
 A Multi-agent System for Modelling Preference-Based Complex Influence Diffusion in Social Networks. 430-447
- Zeynep Engin  , Philip C. Treleaven: , Philip C. Treleaven:
 Algorithmic Government: Automating Public Services and Supporting Civil Servants in using Data Science Technologies. 448-460
- Sandra Sampaio, Mashael Aljubairah, Hapsoro Adi Permana, Pedro Sampaio: 
 A Conceptual Approach for Supporting Traffic Data Wrangling Tasks. 461-480
Volume 62, Number 4, April 2019
Original Articles
- Gaoli Wang, Zhenfu Cao  , Xiaolei Dong: , Xiaolei Dong:
 Improved Fault-Tolerant Aggregate Signatures. 481-489
- Hui Guo, Zhenfeng Zhang, Jing Xu, Ningyu An: 
 Non-transferable Proxy Re-encryption. 490-506
- Fatemeh Rezaeibagha  , Yi Mu , Yi Mu : :
 Efficient Micropayment of Cryptocurrency from Blockchains. 507-517
- Van Tuyen Dang  , Truong Thu Huong , Truong Thu Huong , Nguyen Huu Thanh , Nguyen Huu Thanh , Pham Ngoc Nam, Ngoc Thanh Nguyen, Alan Marshall: , Pham Ngoc Nam, Ngoc Thanh Nguyen, Alan Marshall:
 SDN-Based SYN Proxy - A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood. 518-534
- Rongjia Li, Chenhui Jin, Ruya Fan: 
 Improved Integral Distinguishers on Compression Function of GOST R Hash Function. 535-544
- Kwangsu Lee  , Dong Hoon Lee, Jong Hwan Park, Moti Yung: , Dong Hoon Lee, Jong Hwan Park, Moti Yung:
 CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts. 545-562
- Ming Zeng, Kai Zhang  , Haifeng Qian, Xiaofeng Chen, Jie Chen: , Haifeng Qian, Xiaofeng Chen, Jie Chen:
 A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications. 563-578
- Hongyun Cai, Fuzhi Zhang  : :
 An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items. 579-597
- Muhammed Ali Bingöl  , Osman Biçer, Mehmet Sabir Kiraz , Osman Biçer, Mehmet Sabir Kiraz , Albert Levi , Albert Levi : :
 An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. 598-613
- Keita Emura  , Hayato Kimura, Toshihiro Ohigashi , Hayato Kimura, Toshihiro Ohigashi , Tatsuya Suzuki: , Tatsuya Suzuki:
 Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations. 614-630
- Yi Zhao  , Yong Yu , Yong Yu , Bo Yang: , Bo Yang:
 Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications. 631-640
Volume 62, Number 5, May 2019
Original Articles
- Mahmoud Darwich  , Mohsen Amini Salehi, Ege Beyazit, Magdy A. Bayoumi: , Mohsen Amini Salehi, Ege Beyazit, Magdy A. Bayoumi:
 Cost-Efficient Cloud-Based Video Streaming Through Measuring Hotness. 641-656
- Mira Gonen, Dana Shapira  , James A. Storer: , James A. Storer:
 Edit Distance with Multiple Block Operations†. 657-669
- A. S. M. Kayes  , Jun Han, Wenny Rahayu, Tharam S. Dillon, Md. Saiful Islam , Jun Han, Wenny Rahayu, Tharam S. Dillon, Md. Saiful Islam , Alan Colman , Alan Colman : :
 A Policy Model and Framework for Context-Aware Access Control to Information Resources†. 670-705
- Shuang Zhao, Jixiang Meng: 
 Arc Fault Tolerance of Maximally Arc-Connected Networks Modeled By Digraphs. 706-714
- Shiying Wang, Mujiangshan Wang  : :
 The strong connectivity of bubble-sort star graphs. 715-729
- Alkida Balliu  , Pierre Fraigniaud: , Pierre Fraigniaud:
 Certification of Compact Low-Stretch Routing Schemes. 730-746
- Yafei Zhai, Limei Lin, Li Xu, Xinxin Zhang, Yanze Huang: 
 The Conditional Diagnosability with g-Good-Neighbor of Exchanged Hypercubes. 747-756
- Khaled El-Fakih  , Nina Yevtushenko, Ayat Saleh: , Nina Yevtushenko, Ayat Saleh:
 Incremental and Heuristic Approaches for Deriving Adaptive Distinguishing Test Cases for Non-deterministic Finite-State Machines. 757-768
- Yi Qi, Yuhao Yi, Zhongzhi Zhang  : :
 Topological and Spectral Properties of Small-World Hierarchical Graphs. 769-784
- Chunlin Li, Jingpan Bai, Shaofeng Du, Chunguang Yang, Youlong Luo: 
 Combining Tag Correlation and Interactive Behaviors for Community Discovery. 785-800
Volume 62, Number 6, June 2019
Original Articles
- Zina Nakhla  , Kaouther Nouira , Kaouther Nouira , Ahmed Ferchichi: , Ahmed Ferchichi:
 Prescription Adverse Drug Events System (PrescADE) Based on Ontology and Internet of Things. 801-805
- Ian Pyle  : :
 Software for the Linesman Radar Data Processing System. 806-819
- Faisal Ahmed, Corentin Kervadec, Yannick Le Moullec  , Gert Tamberg, Paul Annus: , Gert Tamberg, Paul Annus:
 Autonomous Wireless Sensor Networks: Implementation of Transient Computing and Energy Prediction for Improved Node Performance and Link Quality. 820-837
- Muhammad Usman  , Aris Cahyadi Risdianto , Aris Cahyadi Risdianto , Jung-Su Han, JongWon Kim: , Jung-Su Han, JongWon Kim:
 Interactive Visualization of SDN-Enabled Multisite Cloud Playgrounds Leveraging SmartX MultiView Visibility Framework. 838-854
- Ab Shaqoor Nengroo, K. S. Kuppusamy: 
 'Advertisements or adverse-tisements?' - An accessibility barrier for persons with visual impairments. 855-868
- Jianzhong Huang  , Jie Xia, Xiao Qin , Jie Xia, Xiao Qin , Qiang Cao, Changsheng Xie: , Qiang Cao, Changsheng Xie:
 Optimization of Small Updates for Erasure-Coded In-memory Stores. 869-883
- Christine Niyizamwiyitira  , Lars Lundberg: , Lars Lundberg:
 A Utilization-Based Schedulability Test of Real-Time Systems Running on a Multiprocessor Virtual Machine. 884-904
- Xing Su, Minjie Zhang  , Quan Bai , Quan Bai : :
 Two Mathematical Programming-Based Approaches for Wireless Mobile Robot Deployment in Disaster Environments. 905-918
- Lamiaa Fattouh Ibrahim  , Hesham Abou El Fetouh Salman, Sara Y. Sery, Zaki Taha: , Hesham Abou El Fetouh Salman, Sara Y. Sery, Zaki Taha:
 Using Clustering Techniques to Plan Indoor Femtocell Base Stations Layout in Multi-floors. 919-930
- Manju C. Thayammal, M. Mary Linda: 
 Utility-Based Optimal Resource Allocation in LTE-A Networks by Hybrid ACO-TS with MFA Scheme. 931-942
- Francesc D. Muñoz-Escoí  , Rubén de Juan-Marín, José-Ramón García-Escrivá, José Ramón González de Mendívil, José M. Bernabéu-Aubán: , Rubén de Juan-Marín, José-Ramón García-Escrivá, José Ramón González de Mendívil, José M. Bernabéu-Aubán:
 CAP Theorem: Revision of Its Related Consistency Models. 943-960
Volume 62, Number 7, July 2019
Original Articles
- Lida Ghahremanlou, Abdel-Rahman H. Tawil, Paul Kearney, Hossein Nevisi  , Xia Zhao, Ali Abdallah , Xia Zhao, Ali Abdallah : :
 A Survey of Open Data Platforms in Six UK Smart City Initiatives. 961-976
- Saber Amri  , Hela Ltifi, Mounir Ben Ayed: , Hela Ltifi, Mounir Ben Ayed:
 A Predictive Visual Analytics Evaluation Approach Based on Adaptive Neuro-Fuzzy Inference System. 977-1000
- Ibrahim Furkan Ince  , Yusuf Sait Erdem , Yusuf Sait Erdem , Faruk Bulut , Faruk Bulut , Md. Haidar Sharif: , Md. Haidar Sharif:
 A Low-Cost Pupil Center Localization Algorithm Based on Maximized Integral Voting of Circular Hollow Kernels. 1001-1015
- Xuezhi Yan, Ruige Li, Xiaoying Sun, Guohong Liu: 
 Effects of Touch Force Profiles and Waveforms of Electrostatic Tactile Feedback on Touchscreen Pan Operation. 1016-1035
- M. Dhivya, M. Renuka Devi: 
 Detection of Structural Defects in Fabric Parts Using a Novel Edge Detection Method. 1036-1043
- Alex Bogatu, Norman W. Paton  , Alvaro A. A. Fernandes, Martin Koehler , Alvaro A. A. Fernandes, Martin Koehler : :
 Towards Automatic Data Format Transformations: Data Wrangling at Scale. 1044-1060
- Alireza Nazemi, Marziyeh Mortezaee: 
 A Novel Collaborate Neural Dynamic System Model for Solving a Class of Min-Max Optimization Problems with an Application in Portfolio Management. 1061-1085
Volume 62, Number 8, August 2019
- Xi Jun Lin, Lin Sun, Haipeng Qu, He-Qun Xian: 
 Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys. 1087-1091
- Yanwei Zhou  , Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu: , Bo Yang, Hong-xia Hou, Lina Zhang, Tao Wang, Mingxiao Hu:
 Continuous Leakage-Resilient Identity-Based Encryption with Tight Security. 1092-1105
- Jordan S. Queiroz, Eduardo Feitosa  : :
 A Web Browser Fingerprinting Method Based on the Web Audio API. 1106-1120
- Qian Wang  , Chenhui Jin: , Chenhui Jin:
 A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure. 1121-1131
- Jiahui Chen  , Jie Ling, Jianting Ning, Jintai Ding , Jie Ling, Jianting Ning, Jintai Ding : :
 Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. 1132-1147
- Nanyuan Cao  , Zhenfu Cao , Zhenfu Cao , Zhen Liu, Xiaolei Dong, Xiaopeng Zhao: , Zhen Liu, Xiaolei Dong, Xiaopeng Zhao:
 All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. 1148-1157
- Hanqiu Liu, Chenhui Jin: 
 An Improvement of the CS Attack to DSC Cipher. 1158-1165
- Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang  : :
 Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. 1166-1177
- Parvin Rastegari, Willy Susilo  , Mohammad Dakhilalian: , Mohammad Dakhilalian:
 Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018). 1178-1193
- Thierry Mefenza, Damien Vergnaud  : :
 Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting. 1194-1213
- Jinguang Han  , Maoxuan Bei, Liqun Chen , Maoxuan Bei, Liqun Chen , Yang Xiang, Jie Cao , Yang Xiang, Jie Cao , Fuchun Guo , Fuchun Guo , Weizhi Meng , Weizhi Meng : :
 Attribute-Based Information Flow Control. 1214-1231
- Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu: 
 On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model. 1232-1245
Volume 62, Number 9, September 2019
- Natarajan Meghanathan  : :
 Centrality and Partial Correlation Coefficient-Based Assortativity Analysis of Real-World Networks. 1247-1264
- Kenji Yasunaga  : :
 Error Correction by Structural Simplicity: Correcting Samplable Additive Errors. 1265-1276
- Shu-Li Zhao, Rong-Xia Hao  , Lidong Wu: , Lidong Wu:
 The Generalized Connectivity of (n, k)-Bubble-Sort Graphs. 1277-1283
- Khalil Mohamed, Ayman El Shenawy  , Hany Harb: , Hany Harb:
 A Hybrid Decentralized Coordinated Approach for Multi-Robot Exploration Task. 1284-1300
- Jinyong Wang  , Xiaoping Mi: , Xiaoping Mi:
 Open Source Software Reliability Model with the Decreasing Trend of Fault Detection Rate. 1301-1312
- Yuxing Yang  : :
 Characterizations of Minimum Structure- and Substructure-Cuts of Hypercubes. 1313-1321
- Zhiwu Xu  , Ping Lu, Haiming Chen: , Ping Lu, Haiming Chen:
 Towards an Effective Syntax and a Generator for Deterministic Standard Regular Expressions. 1322-1341
- Tangliu Wen  , Lan Song, Zhen You: , Lan Song, Zhen You:
 Proving Linearizability Using Reduction. 1342-1364
- Ying Jiang, Jian Liu, Gilles Dowek, Kailiang Ji: 
 Towards Combining Model Checking and Proof Checking. 1365-1402
Volume 62, Number 10, October 2019
- Saurabh K. Pandey  , Mukesh A. Zaveri: , Mukesh A. Zaveri:
 DoA-Based Event Localization Using Uniform Concentric Circular Array in the IoT Environment. 1403-1425
- Islam Elleuch  , Achraf Makni , Achraf Makni , Rafik Bouaziz: , Rafik Bouaziz:
 Cooperative Overtaking Assistance System Based on V2V Communications and RTDB. 1426-1449
- Zikai Zhang  , Jigang Wu, Long Chen , Jigang Wu, Long Chen , Guiyuan Jiang, Siew-Kei Lam: , Guiyuan Jiang, Siew-Kei Lam:
 Collaborative Task Offloading with Computation Result Reusing for Mobile Edge Computing. 1450-1462
- Guijuan Wang, Cheng-Kuan Lin, Baolei Cheng, Jianxi Fan, Weibei Fan: 
 Structure Fault-Tolerance of the Generalized Hypercube. 1463-1476
- Hisham M. Almasaeid: 
 Maximizing Achievable Transmission Time in Cognitive Radio Networks Under Sensor-Aided Crowdsourced Spectrum Sensing. 1477-1489
- Hui Cai  , Yanmin Zhu, Jie Li , Yanmin Zhu, Jie Li , Jiadi Yu: , Jiadi Yu:
 Double Auction for a Data Trading Market with Preferences and Conflicts of Interest. 1490-1504
- Mohamed A. Bayoumi, Tarek M. Salem, Samir M. Koriem: 
 Improving the Mechanism of Detecting and Measuring Holes in Ad hoc Wireless Sensor Network. 1505-1514
- Jianhua Fan, Tao Liang, Tongxiang Wang, Jianwei Liu: 
 Identification and Localization of the Jammer in Wireless Sensor Networks. 1515-1527
- Moresh Madhukar Mukhedkar, Uttam D. Kolekar: 
 Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm. 1528-1545
Volume 62, Number 11, November 2019
- Sarah Alhumoud  : :
 Twitter Analysis for Intelligent Transportation. 1547-1556
- Sreenithya Sumesh, Aneesh Krishna  , Chitra M. Subramanian: , Chitra M. Subramanian:
 Game Theory-Based Reasoning of Opposing Non-functional Requirements using Inter-actor Dependencies. 1557-1583
- Vasile Palade, J. Gerard Wolff  : :
 A Roadmap for the Development of the 'SP Machine' for Artificial Intelligence. 1584-1604
- Muhammad Adnan  , Muhammad Afzal , Muhammad Afzal , Khadim Hussain Asif: , Khadim Hussain Asif:
 Ontology-Oriented Software Effort Estimation System for E-commerce Applications Based on Extreme Programming and Scrum Methodologies. 1605-1624
- Jianbin Huang, Qingquan Bian, Heli Sun  , Yaming Yang, Yu Zhou: , Yaming Yang, Yu Zhou:
 Parameter-free Community Detection through Distance Dynamic Synchronization. 1625-1638
- Manashee Kalita  , Themrichon Tuithung, Swanirbhar Majumder , Themrichon Tuithung, Swanirbhar Majumder : :
 A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution. 1639-1655
- N. Shankar, S. Sathish Babu, C. Viswanathan  : :
 Femur Bone Volumetric Estimation for Osteoporosis Classification Using Optimization-Based Deep Belief Network in X-Ray Images. 1656-1670
- Roger Santos Ferreira, Denilson Alves Pereira  : :
 BigFeel - A Distributed Processing Environment for the Integration of Sentiment Analysis Methods. 1671-1683
- Ondrej Zamazal  : :
 Machine Learning Support for EU Funding Project Categorization. 1684-1694
- Rajangam Vijayarajan  , P. Gnanasivam, R. Avudaiammal , P. Gnanasivam, R. Avudaiammal : :
 Bio-Key Based AES for Personalized Image Cryptography. 1695-1705
Volume 62, Number 12, December 2019
- Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Régine Laleau: 
 SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy. 1707-1733
- Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai: 
 MoG: Behavior-Obfuscation Resistance Malware Detection. 1734-1747
- Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang  , Hua Zhang, Qiaoyan Wen: , Hua Zhang, Qiaoyan Wen:
 Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. 1748-1760
- Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao: 
 Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. 1761-1776
- Zhenhui Han  , Xingshu Chen, Xuemei Zeng, Yi Zhu, Mingyong Yin: , Xingshu Chen, Xuemei Zeng, Yi Zhu, Mingyong Yin:
 Detecting Proxy User Based on Communication Behavior Portrait. 1777-1792
- Jianghua Zhong, Dongdai Lin: 
 On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers. 1793-1804
- Lele Chen, Gaoli Wang, Guoyan Zhang: 
 MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS. 1805-1821
- Venkatraman Subbarayalu  , B. Surendiran , B. Surendiran , P. Arun Raj Kumar: , P. Arun Raj Kumar:
 Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things. 1822-1839
- Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan  , Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang: , Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
 A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. 1840-1848
- San Ling  , Khoa Nguyen , Khoa Nguyen , Huaxiong Wang, Juanyang Zhang: , Huaxiong Wang, Juanyang Zhang:
 Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation. 1849-1862

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














