Journal: Comput. J.

Volume 54, Issue 4

503 -- 504Fairouz Kamareddine. Capsule Reviews
505 -- 512Zuowen Tan. An Off-line Electronic Cash Scheme Based on Proxy Blind Signature
513 -- 524Fuchun Guo, Yi Mu, Willy Susilo. Short Signatures with a Tighter Security Reduction Without Random Oracles
525 -- 536Qiong Huang, Duncan S. Wong, Guomin Yang. Heterogeneous Signcryption with Key Privacy
537 -- 548Mehran S. Fallah, Maryam Mouzarani. A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs
549 -- 569Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
570 -- 588Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. A Survey of Outlier Detection Methods in Network Anomaly Identification
589 -- 601Ender YĆ¼ksel, Hanne Riis Nielson, Flemming Nielson. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks
602 -- 616Murat Ergun, Albert Levi, Erkay Savas. Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach
617 -- 627David Taniar, Maytham Safar, Quoc Thai Tran, J. Wenny Rahayu, Jong Hyuk Park. Spatial Network RNN Queries in GIS
628 -- 638Chien-Lung Chan. Information Security Risk Modeling Using Bayesian Index