Journal: Comput. J.

Volume 64, Issue 4

509 -- 533Cong Li, Qingni Shen, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu. Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model
534 -- 549Zhenbin Yan, Yi Deng. Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity
550 -- 563Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi. Two-Factor Decryption: A Better Way to Protect Data Security and Privacy
564 -- 574Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar. KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
575 -- 598Zhen Liu 0008, Qiong Huang, Duncan S. Wong. On Enabling Attribute-Based Encryption to Be Traceable Against Traitors
599 -- 609Tran Nghi Phu, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan, Nguyen Ngoc Binh. An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection
610 -- 627Fulei Ji, Wentao Zhang, Tianyou Ding. Improving Matsui's Search Algorithm For The Best Differential/Linear Trails And Its Applications For DES, DESL And GIFT
628 -- 638Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier. Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff
639 -- 652Colin Boyd, Kai Gellert. A Modern View on Forward Security
653 -- 660Xi Jun Lin, Qihui Wang, Lin Sun 0005, Zhen Yan, Peishun Liu. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
661 -- 674Yunhao Ling, Sha Ma, Qiong Huang, XiMing Li, Yijian Zhong, YunZhi Ling. Efficient Group ID-Based Encryption With Equality Test Against Insider Attack