Journal: Comput. J.

Volume 60, Issue 4

457 -- 475Tomasz Hyla, Jerzy Pejas. A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates
476 -- 490Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha. Elliptic Curve Multiset Hash
491 -- 496Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme
497 -- 506Shaoquan Jiang. Bounds for Message Authentication with Distortion
507 -- 526Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue. On the (In)Security of Recent Group Key Distribution Protocols
527 -- 540Kenneth Radke, Colin Boyd. Security Proofs for Protocols Involving Humans
541 -- 554Leyou Zhang, Jingxia Zhang, Yi Mu. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System
555 -- 572Emin Islam Tatli, Bedirhan Urgun. WIVET - Benchmarking Coverage Qualities of Web Crawlers
573 -- 587Muhammet Yildiz, Berrin A. Yanikoglu, Alisher Kholmatov, Alper Kanak, Umut Uludag. Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion
588 -- 599Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li. Anonymous Announcement System (AAS) for Electric Vehicle in VANETs
600 -- 612Yujue Wang, HweeHwa Pang. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases
613 -- 624Wentan Yi, Shaozhen Chen, Yuchen Li. Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits