Journal: Comput. J.

Volume 58, Issue 10

2193 -- 2194David G. Rosado, Nadira Lammari, Jan Jürjens. Special Issue on Secure Information Systems Engineering
2195 -- 2212Maryam Sepehri, Stelvio Cimato, Ernesto Damiani. Privacy-Preserving Query Processing by Multi-Party Computation
2213 -- 2224Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis. Privacy as an Integral Part of the Implementation of Cloud Solutions
2225 -- 2232D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram. A Trust Evaluation Model for Cloud Computing Using Service Level Agreement
2233 -- 2254Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. ISGcloud: a Security Governance Framework for Cloud Computing
2255 -- 2279Thomas Quirchmayr, Mark Strembeck. A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs
2280 -- 2296Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski. The Robust Measurement Method for Security Metrics Generation
2297 -- 2312Takeshi Takahashi, Youki Kadobayashi. Reference Ontology for Cybersecurity Operational Information
2313 -- 2327Ricardo J. Rodríguez, José Merseguer, Simona Bernardi. Modelling Security of Critical Infrastructures: A Survivability Assessment
2328 -- 2350Jose Fran. Ruiz, Antonio Maña, Carsten Rudolph. An Integrated Security and Systems Engineering Process and Modelling Framework
2351 -- 2367Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo. Modernizing Secure OLAP Applications with a Model-Driven Approach
2368 -- 2387Kazim Yumbul, Erkay Savas. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms
2388 -- 2403Udaya Kiran Tupakula, Vijay Varadharajan. Trust Enhanced Security for Tenant Transactions in the Cloud Environment
2404 -- 2425Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett. CHURNs: Freshness Assurance for Humans
2426 -- 2442Chunfeng Lian, Liaojun Pang, Jimin Liang. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures
2443 -- 2460Xing Wang, Nga Lam Or, Ziyan Lu, Derek Pao. Hardware Accelerator to Detect Multi-Segment Virus Patterns
2461 -- 2475Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong-Hoon Lee. mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments
2476 -- 2491Grazielle Vernize, André Luiz Pires Guedes, Luiz Carlos Pessoa Albini. Malicious Nodes Identification for Complex Network Based on Local Views
2492 -- 2506Jianghong Wei, Wenfen Liu, Xuexian Hu. Forward-Secure Threshold Attribute-Based Signature Scheme
2507 -- 2508Debiao He, Mingwu Zhang, Baowen Xu. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
2509 -- 2519Chang Xu, Liehuang Zhu, Zhoujun Li, Feng Wang. One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority
2520 -- 2536Shifeng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks
2537 -- 2556Zoran Djuric, Dragan Gasevic. FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions
2557 -- 2566Lanfranco Lopriore. Password Management: Distribution, Review and Revocation
2567 -- 2582Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers
2583 -- 2594Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen. Reversible Steganographic Method Using Complexity Control and Human Visual System
2595 -- 2607Dong Lai Fu, Xinguang Peng, Yuli Yang. Trusted Validation for Geolocation of Cloud Data
2608 -- 2621Shahid Alam, Issa Traoré, Ibrahim Sogukpinar. Annotated Control Flow Graph for Metamorphic Malware Detection
2622 -- 2635Md. Saiful Islam, Naif Alajlan. Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability
2636 -- 2648SK Hafizul Islam, Fagen Li. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings
2649 -- 2664Pericle Perazzo, Pavel Skvortsov, Gianluca Dini. On Designing Resilient Location-Privacy Obfuscators
2665 -- 2676Yang Wang, Willy Susilo, Man Ho Au. Revisiting Security Against the Arbitrator in Optimistic Fair Exchange
2677 -- 2685Lin Ding, Chenhui Jin, Jie Guan, ShaoWu Zhang, Ting Cui, Dong Han, Wei Zhao. Cryptanalysis of WG Family of Stream Ciphers
2686 -- 2697Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri. PKE-AET: Public Key Encryption with Authorized Equality Test
2698 -- 2715Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai. Revocable Group Signature with Constant-Size Revocation List
2716 -- 2737Erkay Savas, Cemal Yilmaz. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES
2738 -- 2746Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions
2747 -- 2757Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen. Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited
2758 -- 2777André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino. Toward a Taxonomy of Malware Behaviors
2778 -- 2792Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong. Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption