Journal: Comput. J.

Volume 60, Issue 8

1111 -- 1130Shuling Wang, Flemming Nielson, Hanne Riis Nielson, Naijun Zhan. Modelling and Verifying Communication Failure of Hybrid Systems in HCSP
1131 -- 1144Hailong Zhang 0001, Yongbin Zhou. Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher
1145 -- 1160Zheng Yang, Junyu Lai, Chao Liu, Wanping Liu, Shuangqing Li. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions
1161 -- 1172Yanwei Zhou, Bo Yang 0003. Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security
1173 -- 1186Guglielmo Cola, Marco Avvenuti, Alessio Vecchio. Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer
1187 -- 1196Hui-fang Yu, Bo Yang. Pairing-Free and Secure Certificateless Signcryption Scheme
1197 -- 1209Haibo Yi, Weijian Li. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme
1210 -- 1222Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation
1223 -- 1237Shabnam Seradji, Mehran S. Fallah. A Bayesian Game of Whitewashing in Reputation Systems
1238 -- 1250Gamze Tillem, Erkay Savas, Kamer Kaya. A New Method for Computational Private Information Retrieval
1251 -- 1270Yang Liu 0039, Andrew Simpson. AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices