Journal: Comput. J.

Volume 58, Issue 4

515 -- 517Zhiyong Zhang. Security, Trust and Risk in Multimedia Social Networks
518 -- 535Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas. Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures
536 -- 548Hui Zhu, Cheng Huang, Hui Li. Information Diffusion Model Based on Privacy Setting in Online Social Networking Services
549 -- 571Hong Zhu, Shengli Tian, Kevin Lü. Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity
572 -- 587WeiTao Song, Bin Hu. Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces
588 -- 600Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li. Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows
601 -- 626Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz. Taxonomy for Trust Models in Cloud Computing
627 -- 643Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao. A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks
644 -- 655Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai. Sensational Headline Identification By Normalized Cross Entropy-Based Metric
656 -- 667Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang. CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks
668 -- 678Zhiyong Zhang, Kanliang Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks
679 -- 687V. Natarajan, Shina Sheen, R. Anitha 0002. Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks
688 -- 699Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang. A Trust Routing for Multimedia Social Networks
700 -- 708Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu. A Composition and Recovery Strategy for Mobile Social Network Service in Disaster
709 -- 723Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi. Security Certification for Service-Based Business Ecosystems
724 -- 734Qiang Tang, Hua Ma, Xiaofeng Chen 0001. Extend the Concept of Public Key Encryption with Delegated Search
735 -- 749Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu. Functional Encryption Resilient to Hard-to-Invert Leakage
750 -- 757Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang. Leakage-Free ID-Based Signature
758 -- 778M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà. MC-2D: An Efficient and Scalable Multicoupon Scheme
779 -- 781Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu. Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'
782 -- 791Lanfranco Lopriore. Password Capabilities Revisited
792 -- 807Ke Gu, Weijia Jia, Chunlin Jiang. Efficient Identity-Based Proxy Signature in the Standard Model
808 -- 822Debasish Das, Utpal Sharma, D. K. Bhattacharyya. Detection of Cross-Site Scripting Attack under Multiple Scenarios
823 -- 830Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu. On Indistinguishability in Remote Data Integrity Checking
831 -- 852Alptekin Küpçü. Official Arbitration with Secure Cloud Storage Application
853 -- 866Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme
867 -- 877Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu. Secure Delegation of Signing Power from Factorization
878 -- 891Hai L. Vu, Kenneth K. Khaw, Tsong Yueh Chen. A New Approach for Network Vulnerability Analysis
892 -- 903Stavros N. Shiaeles, Maria Papadaki. FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks
904 -- 921Huacui Liu, Chenhui Jin. Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure
922 -- 933Yu-Chi Chen. SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks
934 -- 943Cheng-Chi Lee, Yan-Ming Lai. Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks
944 -- 960Franco Frattolillo. Watermarking Protocols: Problems, Challenges and a Possible Solution
961 -- 972Abdulah Abdulah Zadeh, Howard M. Heys. Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers
973 -- 985Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang. Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack
986 -- 1002Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang. Public Key Encryption with Delegated Equality Test in a Multi-User Setting
1003 -- 1020Qiang Tang. From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data
1021 -- 1039Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo. An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants