Journal: Comput. J.

Volume 54, Issue 10

1561 -- 1564Fairouz Kamareddine. Capsule Reviews
1565 -- 1581Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. Surveying Port Scans and Their Detection Methodologies
1582 -- 1591Duc-Phong Le, Chao-Liang Liu. Refinements of Miller's Algorithm over Weierstrass Curves Revisited
1592 -- 1602Salih Ergün. A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator
1603 -- 1615Ruben Rios, Javier Lopez. Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks
1616 -- 1631Hossein Homaei, Hamid Reza Shahriari. Compositional Approach to Quantify the Vulnerability of Computer Systems
1632 -- 1644Kai Xi, Yan Tang, Jiankun Hu. Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment
1645 -- 1651Yong Yu, Yi Mu, Guilin Wang, Ying Sun. Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature
1652 -- 1660Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang. k Mins Problem
1661 -- 1674Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu. Secure Image Retrieval Based on Visual Content and Watermarking Protocol
1675 -- 1687Lan Zhou, Vijay Varadharajan, Michael Hitchens. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
1688 -- 1699Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang. Fully Deniable Message Authentication Protocols Preserving Confidentiality
1700 -- 1720Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang. The Microcosmic Model of Worm Propagation
1721 -- 1735Erika Rosas, Olivier Marin, Xavier Bonnaire. CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables