Journal: IJES

Volume 7, Issue 3/4

191 -- 202Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu. Cooperative attribute-based access control for enterprise computing system
203 -- 215Zhi-Yi Shao, Bo Yang. Proof of retrievability with efficient verification
216 -- 229Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan. Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
230 -- 243XiaoBo Chu, Dengguo Feng. On the provable security of TPM2.0 cryptography APIs
244 -- 256Nan Jiang, Sixin Jin, Tao Wan, Yueshun He. MVP: modelling virus propagation for IPv6 wireless sensor networks
257 -- 265Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li. A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
266 -- 279Jingwei Liu, Qian Li, Rong Sun, Sawand Muhammad Ajmal. Energy-efficient key agreement protocols for wireless body area networks
280 -- 288Ling Liu, Hanyu Quan, Xuefeng Liu, Yuqing Zhang. Lightweight handover authentication with location privacy-preserving in mobile wireless networks
289 -- 295Wujun Zhang, Xiaohui Wang, Yunya Zhou, Hua Deng, YuMin Wang. A GAA-based batch authentication and key agreement for LTE networks
296 -- 305Satria Mandala, Md. Asri Ngadi, Johan Mohamad Sharif, M. Soperi Mohd Zahid, Farhan Mohamed. Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
306 -- 317Song Luo. Anonymous hierarchical identity-based encryption without key delegation in decryption
318 -- 323Junjie Peng, Yuanyuan Chen. A low energy consumption WSN node
324 -- 333Zhongwen Li, Qian Li, Zhibin Xu, Hai Jiang, Kuan-Ching Li. A secured transmission model for EPC network
334 -- 344Jingzhao Li, Ren Ping, Ling-Ling Shi, Shunxiang Zhang. Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering

Volume 7, Issue 2

91 -- 103QingLing Cai, Yiju Zhan, Jian Yang. RFID authentication protocol design methodology
104 -- 114Andrej Kos, Urban Sedlar, Mojca Volk, Klemen Peternel, Joze Guna, Aleksander Kovacic, Gregor Burger, Janez Bester, Saso Tomazic, Matevz Pogacnik. Real-time eHealth visualisation and actuation platform
115 -- 122Qiang Li, Guoyin Zhu, Lixin Miao. Developing operation layer of logistics information system based on EPCIS
123 -- 132Linghao Zhu, Cheng Wu, Linyin Wu, Junyu Wang, Hao Min. A DPA-resistant crypto engine for UHF RFID tag
133 -- 147Kamel Messaoudi, El-Bay Bourennane, Salah Toumi, Hichem Mayache, Nawfel Messaoudi, Ouassila Labbani. Utilisation of the Array-OL specification language for self-generation of a memory controller especially for the H.264/AVC
148 -- 155Ying-hong Dong, Hao Chen, Wei-ning Qian, Ao-ying Zhou. Micro-blog social moods and Chinese stock market: the influence of emotional valence and arousal on Shanghai Composite Index volume
156 -- 161Jun Liu, Hongwei Jiang, Xiaoming Liu. A 3-D robust detail preserving anisotropic diffusion for speckle reduction in 3-D cattle follicle ultrasound image
162 -- 169Qian Xiao, Haitao Xie. A social tag recommendation method alleviating cold start based on probabilistic graphical model
170 -- 179Tran Van Dung, Ittetsu Taniguchi, Takuji Hieda, Hiroyuki Tomiyama. Function-level profiling for embedded software with QEMU
180 -- 188Lu Pu, Xiaowei Xu, Han He, Hanqing Zhou, Zhijun Qiu, Yu Hu. A flexible control study of variable speed limit in connected vehicle systems

Volume 7, Issue 1

1 -- 10Ivan Kolchin, Sergey Filippov. Bare-metal microhypervisor prototype and measurement of real-time characteristics
11 -- 25Linwei Niu, Gang Quan. Peripheral-conscious energy-efficient scheduling for weakly hard real-time systems
26 -- 33Guilin Li, Xing Gao, Minghong Liao, Bing Han. An iterative algorithm to process the top-k query for the wireless sensor networks
34 -- 42Tai Wang, Zongkui Zhou, Tingshao Zhu, Yang Wei. Mood disorder patients' language features on their microblogs
43 -- 54Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan, Guojun Wang. Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring
55 -- 62Ruhan He, Yongsheng Yu, Jia Chen, Min Li, Xun Yao. Region covariance tracking with hybrid search strategy
63 -- 70Zhensong Liao, Qiang Yin, Yan Huang, Li Sheng. Management and application of mobile big data
71 -- 78Chao Wu, Bin Xu, Shanshan Shi, Bin Zhao. Time-activity pattern observatory from mobile web logs
79 -- 87Li Zhu, Shengyong Xu. Prediction algorithm based on web mining for multimedia objects in next-generation Digital Earth