Journal: Comput. J.

Volume 59, Issue 4

439 -- 451Wuqiang Shen, Shaohua Tang. RGB, a Mixed Multivariate Signature Scheme
452 -- 461Leyou Zhang, Yi Mu, Qing Wu. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys
462 -- 492Simeon Veloudis, Nimal Nissanke. A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models
493 -- 507Mingwu Zhang, Yi Mu. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations
508 -- 521Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction
522 -- 540Peng Zhou, Xiaojing Gu, Rocky K. C. Chang. Harvesting File Download Exploits in the Web: A Hacker's View
541 -- 548Xinran Li, Chen-Hui Jin, Fang-Wei Fu. Improved Results of Impossible Differential Cryptanalysis on Reduced FOX
549 -- 558Guo-qiang Liu, Chen-Hui Jin. Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation
559 -- 569Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang. Anonymous Proxy Signature with Hierarchical Traceability
570 -- 591Emma Osborn, Andrew C. Simpson. On Safety and Security Requirements in Emerging Ubiquitous Computing Models
592 -- 601Hung-Yu Chien. A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients