Journal: Comput. J.

Volume 55, Issue 4

379 -- 381Fairouz Kamareddine. Capsule Reviews
382 -- 383Jiankun Hu, Yang Xiang, Wanlei Zhou. Advances in Network and System Security: Editorial Statement
384 -- 396Leonardo B. Oliveira, Aman Kansal, Conrado Porto Lopes Gouvêa, Diego F. Aranha, Julio López, Bodhi Priyantha, Michel Goraczko, Feng Zhao. Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks
397 -- 409Udaya Kiran Tupakula, Vijay Varadharajan. Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines
410 -- 421Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics
422 -- 437Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang. Satisfying Privacy Requirements Before Data Anonymization
438 -- 0Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
439 -- 446Hung-Yu Chien. Improved Anonymous Multi-receiver Identity-Based Encryption
447 -- 456Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang. On F5 Steganography in Images
457 -- 474Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. Certificateless Signatures: New Schemes and Security Models
475 -- 486Yuh-Min Tseng, Tung-Tso Tsai. Efficient Revocable ID-Based Encryption with a Public Channel
487 -- 496Li-na Zhu, Li Feng, Zuochang Zhang. Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning
497 -- 507Lanfranco Lopriore. Encrypted Pointers in Protection System Design