Journal: Comput. J.

Volume 63, Issue 8

1125 -- 1138Mahmood Yousefi Azar, Len Hamey, Vijay Varadharajan, Shiping Chen 0001. Byte2vec: Malware Representation and Feature Selection for Android
1139 -- 1147Wenjie Yang, Jian Weng 0001, Xinyi Huang, Anjia Yang. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
1148 -- 1167Robab Alyari, Jaber Karimpour, Habib Izadkhah. Specifying a New Requirement Model for Secure Adaptive Systems
1168 -- 1193María Magdalena Payeras Capellà, Macià Mut Puigserver, Pau Conejero-Alberola, Jordi Castellà-Roca, Llorenç Huguet i Rotger. Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services
1194 -- 1202Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran. A Multivariate Blind Ring Signature Scheme
1203 -- 1215Yang Chen, Wenmin Li, Fei Gao 0001, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Practical Attribute-Based Conjunctive Keyword Search Scheme
1216 -- 1230Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao 0001, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage
1231 -- 1246Haibo Zhou, Zheng Li 0008, Xiaoyang Dong, Keting Jia, Willi Meier, Tomer Ashur. Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
1247 -- 1258Muhua Liu, Ping Zhang. An Adaptively Secure Functional Encryption for Randomized Functions
1259 -- 1262Xi Jun Lin, Lin Sun 0005, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen. On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model
1263 -- 1270Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Kaitai Liang. Leakage-free ID-Based Signature, Revisited
1271 -- 0Qianqian Su, Rui Zhang 0016, Rui Xue 0001. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud