Journal: Comput. J.

Volume 62, Issue 4

481 -- 489Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved Fault-Tolerant Aggregate Signatures
490 -- 506Hui Guo, Zhenfeng Zhang, Jing Xu 0002, Ningyu An. Non-transferable Proxy Re-encryption
507 -- 517Fatemeh Rezaeibagha, Yi Mu 0001. Efficient Micropayment of Cryptocurrency from Blockchains
518 -- 534Van Tuyen Dang, Thu-Huong Truong, Nguyen Huu Thanh, Pham Ngoc Nam 0001, Ngoc Thanh Nguyen, Alan Marshall. SDN-Based SYN Proxy - A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood
535 -- 544Rongjia Li, Chenhui Jin, Ruya Fan. Improved Integral Distinguishers on Compression Function of GOST R Hash Function
545 -- 562Kwangsu Lee, Dong-Hoon Lee, Jong Hwan Park, Moti Yung. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
563 -- 578Ming Zeng, Kai Zhang 0016, Haifeng Qian, Xiaofeng Chen, Jie Chen. A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
579 -- 597HongYun Cai, Fuzhi Zhang. An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items
598 -- 613Muhammed Ali Bingöl, Osman Biçer, Mehmet Sabir Kiraz, Albert Levi. An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
614 -- 630Keita Emura, Hayato Kimura, Toshihiro Ohigashi, Tatsuya Suzuki 0002. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations
631 -- 640Yi Zhao, Yong Yu 0002, Bo Yang 0003. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications