Journal: Comput. J.

Volume 56, Issue 4

407 -- 421Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles
422 -- 439Geraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach
440 -- 463Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan. Dynamic Access Control Policies: Specification and Verification
464 -- 477Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate
478 -- 496Lanfranco Lopriore. Protection Structures in Multithreaded Systems
497 -- 507Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong. Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure
508 -- 525Gianluca Dini, Marco Tiloca. HISS: A HIghly Scalable Scheme for Group Rekeying