Journal: Comput. J.

Volume 61, Issue 8

1109 -- 1122Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi PuiggalĂ­ Allepuz, Pol Valletb Montfort. A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System
1123 -- 1132Rong Wang, Yan Zhu 0007, Tung-Shou Chen, Chin-Chen Chang 0001. An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining
1133 -- 1142Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li. Secure and Efficient Attribute-Based Encryption with Keyword Search
1143 -- 1157Gunikhan Sonowal, K. S. Kuppusamy. SmiDCA: An Anti-Smishing Model with Machine Learning Approach
1158 -- 1165Rongjia Li, Chenhui Jin. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
1166 -- 1179Xiaojuan Zhang 0003, Xiutao Feng, Dongdai Lin. Fault Attack on ACORN v3
1180 -- 1201Amir Daneshgar, Fahimeh Mohebbipoor. A Secure Self-Synchronized Stream Cipher
1202 -- 1215Baoguo Yuan, Junfeng Wang 0003, Zhiyang Fang, Li Qi. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection
1216 -- 1227Jianye Huang, Qiong Huang, Willy Susilo. Leakage-Resilient Dual-Form Signatures
1228 -- 1239Dianyan Xiao, Yang Yu 0008. Klepto for Ring-LWE Encryption
1240 -- 1251Jianchang Lai, Yi Mu 0001, Fuchun Guo, Peng Jiang, Sha Ma. Identity-Based Broadcast Encryption for Inner Products
1252 -- 1258Ya Liu 0001, Anren Yang, Bo Dai, Wei Li 0013, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
1259 -- 1268Baodong Qin, Qinglan Zhao, Dong Zheng 0001. Bounded Revocable and Outsourceable ABE for Secure Data Sharing