Journal: Comput. J.

Volume 55, Issue 10

1147 -- 0Fairouz Kamareddine. Capsule Reviews
1148 -- 1156Manoj Thomas, Gurpreet Dhillon. Interpreting Deep Structures of Information Systems Security
1157 -- 1168Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption
1169 -- 1179Yu-Fang Chung, Zhen Yu Wu. Casting Ballots over Internet Connection Against Bribery and Coercion
1180 -- 1191Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement
1192 -- 1201Lin Ding, Jie Guan. Cryptanalysis of Loiss Stream Cipher
1202 -- 1215Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Oblivious Access Control
1216 -- 1231Derek Pao, Xing Wang. Multi-Stride String Searching for High-Speed Content Inspection
1232 -- 1243Hyejin Son, Tae Yoon Kang, Hwangnam Kim, Jong-Bae Park, Jae Hyung Roh. A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid
1244 -- 1264Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim. An Authorization Framework using Building Information Models
1265 -- 0João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic
1266 -- 0Paul S. Rosenbloom. Erratum: Computing and Computation