Journal: Comput. J.

Volume 57, Issue 4

481 -- 493Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. Server-Aided Signature Verification for Lightweight Devices
494 -- 509Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian. ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
510 -- 536Juan Manuel González Nieto, Mark Manulis, Dongdong Sun. Forward-Secure Hierarchical Predicate Encryption
537 -- 556Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
557 -- 566Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-fei Zhu. Adaptive ±1 Steganography in Extended Noisy Region
567 -- 578Shengke Zeng, Shaoquan Jiang. A New Framework for Conditionally Anonymous Ring Signature
579 -- 591Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
592 -- 601Limin Shen, Futai Zhang, Yinxia Sun. Efficient Revocable Certificateless Encryption Secure in the Standard Model
602 -- 623Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method
624 -- 635Faezeh Sadat Babamir, Ali Norouzi. Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare
636 -- 638Huaqun Wang. Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption'