Journal: Comput. J.

Volume 59, Issue 7

945 -- 954Joseph K. Liu, Sze-Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo. Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol
955 -- 969Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen. Online/Offline Ciphertext Retrieval on Resource Constrained Devices
970 -- 982Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
983 -- 1004Zhen Liu, Duncan S. Wong. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
1005 -- 1027Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers
1028 -- 1039Jiguo Li, Haiting Du, Yichen Zhang. Certificate-Based Key-Insulated Signature in the Standard Model
1040 -- 1053Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles
1054 -- 1065Kunpeng Bai, Chuankun Wu. An AES-Like Cipher and Its White-Box Implementation
1066 -- 1075Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
1076 -- 1090Mario Diego Munoz-Hernandez, Miguel Morales-Sandoval, Jose Juan Garcia Hernandez. An End-to-End Security Approach for Digital Document Management
1091 -- 1101Haibo Yi, Shaohua Tang. Very Small FPGA Processor for Multivariate Signatures
1102 -- 1112Haibo Yi, Shaohua Tang, Ranga Vemuri. Fast Inversions in Small Finite Fields by Using Binary Trees