Journal: Comput. J.

Volume 61, Issue 12

1749 -- 1771David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright. From Keys to Databases - Real-World Applications of Secure Multi-Party Computation
1772 -- 1782Eunsung Lee, Sang-Woo Kim. Non-interactive Conditional Proxy Re-Signature in the Standard Model
1783 -- 1790Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia. Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm
1791 -- 1793Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Dongxiao Liu. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search
1794 -- 1805Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han. Computational Robust Fuzzy Extractor
1806 -- 1824Yi Dou, Henry C. B. Chan, Man Ho Au. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage
1825 -- 1844Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu. Tightly Secure Encryption Schemes against Related-Key Attacks
1845 -- 1861Biao Wang, Xueqing Wang, Rui Xue 0001, Xinyi Huang. Matrix FHE and Its Application in Optimizing Bootstrapping
1862 -- 1879Yung-Ting Chuang, Yi-Fan Lee. Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks
1880 -- 1896Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang. Structural Key Recovery of Simple Matrix Encryption Scheme Family
1897 -- 1908Qingwen Guo, Qiong Huang, Guomin Yang. Authorized Function Homomorphic Signature