Journal: Comput. J.

Volume 61, Issue 4

469 -- 471Jianhong Zhang, Jian Mao. On the Security of a Pairing-Free Certificateless Signcryption Scheme
472 -- 495Emma Osborn, Andrew Simpson. Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study
496 -- 511Haiqin Wu, Liangmin Wang, Shunrong Jiang. Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments
512 -- 525Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo. Criteria-Based Encryption
526 -- 538Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang. An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection
539 -- 544Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme
545 -- 560Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols
561 -- 574Qiqi Lai, Bo Yang 0003, Yong Yu, Yuan Chen, Jian Bai. Novel Smooth Hash Proof Systems Based on Lattices
575 -- 585Husen Wang, Qiang Tang 0001. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE
586 -- 600Yanwei Zhou, Bo Yang 0003, Yi Mu. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
601 -- 613Kamalkumar R. Macwan, Sankita J. Patel. k-NMF Anonymization in Social Network Data Publishing
614 -- 628Kaushal A. Shah, Devesh C. Jinwala. Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks