Journal: Comput. J.

Volume 64, Issue 8

1145 -- 1162Mojtaba Rafiee, Shahram Khazaei. Private Set Operations Over Encrypted Cloud Dataset and Applications
1163 -- 1177Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang. Novel Public-Key Encryption with Continuous Leakage Amplification
1178 -- 1192Haixia Chen, Xinyi Huang, Wei Wu 0001, Yi Mu 0001. Privacy-Aware Image Authentication from Cryptographic Primitives
1193 -- 1214Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi. A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm
1215 -- 1225Yong Fang, Yuchi Zhang, Cheng Huang. CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
1226 -- 1238Hao Lin, Zhen Zhao 0005, Fei Gao 0001, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi. Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage
1239 -- 1252Sha Ma, Qiong Huang. CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model
1253 -- 1263Sudong Ma, Jie Guan. Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher
1264 -- 1276Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory
1277 -- 1292Hailong Zhang 0001, Wei Yang. Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher
1293 -- 1302Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee 0001. A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
1303 -- 1314Yangguang Tian, Yingjiu Li, Yi Mu 0001, Guomin Yang. Unlinkable and Revocable Secret Handshake