Journal: J. Internet Serv. Inf. Secur.

Volume 1, Issue 4

1 -- 4Christian Damsgaard Jensen, Nicola Dragoni, Anirban Basu, Clara Mancini. Frontiers in Trust Management
5 -- 25Yanbin Lu, Gene Tsudik. Privacy-Preserving Cloud Database Querying
26 -- 46Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi. Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor
47 -- 59Marcello Paolo Scipioni, Marc Langheinrich. Towards a New Privacy-Aware Location Sharing Platform
60 -- 73Tracy Ann Kosa, Khalil El-Khatib, Stephen Marsh 0001. Measuring Privacy
74 -- 88Manuel Mazzara, Antonio Marraffa, Luca Biselli, Luca Chiarabini. The Polidoxa Shift: a New Approach to Social Networks
89 -- 109Johari Abdullah, Aad P. A. van Moorsel. Uncertainty and Uncertainty Tolerance in Service Provisioning
110 -- 119Natasha Dwyer, Tom Clark, Piotr Cofta. Reading Trust and Distrust in Shared Documents: Film Professionals Review Film Reviews

Volume 1, Issue 2/3

1 -- 3Xiaofeng Chen. Provable Security
4 -- 20Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez. VDC-Based Dynamic Code Analysis: Application to C Programs
21 -- 31Maciej Grzeskowiak. Algorithm for Generating Primes for the Giuliani-Gong Public Key System
32 -- 43Hai Huang. An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
44 -- 56Dexin Yang, Bo Yang. A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
57 -- 73Mario Larangeira, Keisuke Tanaka. Programmability in the Generic Ring and Group Models
74 -- 88Shengli Liu, Junzuo Lai, Robert H. Deng. General Construction of Chameleon All-But-One Trapdoor Functions
89 -- 106Kristian Gjøsteen, George Petrides, Asgeir Steine. A Novel Framework for Protocol Analysis
107 -- 124Jiaxin Pan, Libin Wang. TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption
125 -- 139Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro. On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
140 -- 160Sébastien Canard, Julien Devigne, Fabien Laguillaumie. Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme
161 -- 180Sumit Kumar Pandey, Rana Barua. Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes

Volume 1, Issue 1

1 -- 3Malek Ben Salem, Bu-Sung Lee, Jie Zhang. Cloud Computing
4 -- 17Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake. Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism
18 -- 36Yu-Shuo Chang, Shih-Hao Hung. Developing Collaborative Applications with Mobile Cloud - A Case Study of Speech Recognition
37 -- 45Shifeng Shang, Bo Wang, Jinlei Jiang, Yongwei Wu, Weimin Zheng. An Intelligent Capacity Planning Model for Cloud Market
46 -- 58Zhi Luo, Junping Wang, QiLiang Zhu. Self-aware Services of NGSDP: Using Bayesian Networks for Measuring Quality of Convergent Services
59 -- 69Keng Y. Yee, Yilun Chia, Flora S. Tsai, Wee Tiong Ang, Rajaraman Kanagasabai. Cloud-based Semantic Service-Oriented Content Provisioning Architecture for Mobile Learning
70 -- 85Turgay Korkmaz, Suleyman Tek. Analyzing Response Time of Batch Signing
86 -- 102William R. Claycomb, Dongwan Shin. Extending Formal Analysis of Mobile Device Authentication