Journal: Comput. J.

Volume 59, Issue 11

1581 -- 1592Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib. A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging
1593 -- 1611Lan Zhou, Vijay Varadharajan, K. Gopinath. A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records
1612 -- 1622Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh. A Multidimension Taxonomy of Insider Threats in Cloud Computing
1623 -- 1636Fatemeh Imani-Mehr, Mehran S. Fallah. How Powerful Are Run-Time Monitors with Static Information?
1637 -- 1658Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions
1659 -- 1668Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu. Identity-Based Encryption with Verifiable Outsourced Revocation
1669 -- 1688Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen 0021. Almost-Tight Identity Based Encryption Against Selective Opening Attack
1689 -- 1694Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang. et al.'s Public Key Encryption with Authorized Equality Test
1695 -- 1713Jiangshan Yu, Vincent Cheval, Mark Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties
1714 -- 1734Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu. Practical Attribute-based Signature: Traceability and Revocability
1735 -- 1748Byungho Min, Vijay Varadharajan. Rethinking Software Component Security: Software Component Level Integrity and Cross Verification