Journal: Comput. J.

Volume 62, Issue 12

1707 -- 1733Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, RĂ©gine Laleau. SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy
1734 -- 1747Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. MoG: Behavior-Obfuscation Resistance Malware Detection
1748 -- 1760Yang Chen, Wenmin Li, Fei Gao 0001, Wei Yin 0004, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures
1761 -- 1776Ya Liu 0001, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu, Yang Bao. Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC
1777 -- 1792Zhenhui Han, Xingshu Chen, Xuemei Zeng, Yi Zhu, MingYong Yin. Detecting Proxy User Based on Communication Behavior Portrait
1793 -- 1804Jianghua Zhong, Dongdai Lin. On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers
1805 -- 1821Lele Chen, Gaoli Wang, Guoyan Zhang. MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS
1822 -- 1839Venkatraman Subbarayalu, B. Surendiran, P. Arun Raj Kumar. Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things
1840 -- 1848Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang. A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
1849 -- 1862San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang. Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation