Journal: JIP

Volume 20, Issue 4

806 -- 813Hong Cheng, Jeffrey Xu Yu. Clustering Large Attributed Graph
814 -- 822RyƓichi Sasaki. Considerations on Risk Communication for IT Systems and Development of Support Systems
823 -- 0Satoru Torii. Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society
824 -- 834Terry Benzel, John Wroclawski. The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation
835 -- 845Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao. Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
846 -- 853Ruan Na, Takashi Nishide, Yoshiaki Hori. Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
854 -- 860Hidenori Kuwakado. Length-preserving CBC Enciphering Scheme and Its Security Analysis
861 -- 870Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura. Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation
871 -- 882Isao Goto, Masao Utiyama, Takashi Onishi, Eiichiro Sumita. An Empirical Comparison of Parsers in Constraining Reordering for E-J Patent Machine Translation