Journal: Comput. J.

Volume 63, Issue 4

495 -- 507Zhichao Yang, Rongmao Chen, Chao Li 0002, Longjiang Qu, Guomin Yang. On the Security of LWE Cryptosystem against Subversion Attacks
508 -- 524Yanwei Zhou, Bo Yang 0003, Tao Wang 0039, Zhe Xia, Hong-xia Hou. Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings
525 -- 535Zhen Zhao 0005, Ge Wu 0001, Fuchun Guo, Willy Susilo, Yi Mu 0001, Baocang Wang, Yupu Hu. Black-Box Accountable Authority Identity-Based Revocation System
536 -- 548Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang. A New Construction for Linkable Secret Handshake
549 -- 566Hao Wang, Kaiju Li. Resistance of IID Noise in Differentially Private Schemes for Trajectory Publishing
567 -- 592Jiafu Jiang, Linyu Tang, Ke Gu, Weijia Jia. Secure Computing Resource Allocation Framework For Open Fog Computing
593 -- 603Er-Rajy Latifa, My Ahmed El Kiram, Mohamed El Ghazouani. New Security Risk Value Estimate Method for Android Applications
604 -- 619Leyli Javid Khayati, Erkay Savas, Halit Alptekin. Intrusion Detection Over Encrypted Network Data
620 -- 632Xuecheng Ma, Dongdai Lin. Server-aided Revocable IBE with Identity Reuse
633 -- 647Qiang Wang 0005, Fucai Zhou, Jian Xu 0004, Zifeng Xu. A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications
648 -- 656Meijuan Huang, Bo Yang 0003, Mingwu Zhang, Lina Zhang, Hong-xia Hou. Updatable Lossy Trapdoor Functions Under Consecutive Leakage