Journal: Comput. J.

Volume 60, Issue 12

1729 -- 1744Yang Lu 0001, Jiguo Li, Jian Shen. Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model
1745 -- 1759El-Sayed M. El-Alfy. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering
1760 -- 1769Abderrahim Ait Wakrime. Satisfiability-Based Privacy-Aware Cloud Computing
1770 -- 1784Jayashree Pougajendy, Arun Raj Kumar Parthiban. Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine
1785 -- 1800Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang 0016. Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size
1801 -- 1808Damien Vergnaud. Comment on 'Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016)
1809 -- 1821Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
1822 -- 1838Sha Ma. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting
1839 -- 1851Howard M. Heys. Statistical Cipher Feedback of Stream Ciphers
1852 -- 1870Xiaofang Xia, Wei Liang, Yang Xiao, Meng Zheng. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid
1871 -- 1888Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu. Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds
1889 -- 1911Xavier Bonnaire, Rudyar Cortes, Fabrice Kordon, Olivier Marin. ASCENT: A Provably Terminating Decentralized Logging Service
1912 -- 1922Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente. Partitioned Group Password-Based Authenticated Key Exchange