Journal: J. Internet Serv. Inf. Secur.

Volume 8, Issue 4

1 -- 15Maharage Nisansala Sevwandi Perera, Takeshi Koshiba. Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation
16 -- 36Paventhan Vivekanandan. A Type-based Formal Specification for Cryptographic Protocols
37 -- 56Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto. Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption
57 -- 69Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa. Lattice-Based Simulatable VRFs: Challenges and Future Directions

Volume 8, Issue 3

1 -- 19Fabio Arena, Giovanni Pau 0002, Mario Collotta. A survey on driverless vehicles: from their diffusion to security features
20 -- 39Tatsuya Ohyanagi, Tomoyuki Ishida. Implementation of an Integrated Common Platform for Zoo Operations
40 -- 53Borja Bordel, Ramón Alcarria. Physical Unclonable Functions based on silicon micro-ring resonators for secure signature delegation in Wireless Sensor Networks
54 -- 63Igor V. Kotenko, Igor Saenko, Alexander Branitskiy. Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring

Volume 8, Issue 2

1 -- 17Chi-Sheng Shih, Jyun-Jhe Chou, Kwei-Jay Lin. WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings
18 -- 32Qiang Zhi, Shuichiro Yamamoto, Shuji Morisaki. IMSA - Intra Model Security Assurance
33 -- 47Fulvio Valenza, Antonio Lioy. User-oriented Network Security Policy Specification
48 -- 86Takshi Gupta, Gaurav Choudhary, Vishal Sharma. A Survey on the Security of Pervasive Online Social Networks (POSNs)

Volume 8, Issue 1

1 -- 0Ilsun You. Letter from the Editor-in-Chief
2 -- 17Chundong Wang, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, Xiaochun Cheng. Channel State Information-Based Detection of Sybil Attacks in Wireless Networks
18 -- 30Zheng-Yang Ai, Fei Song, Xi Wang. Combining SDN and ICN for Network Survivability Improvement
31 -- 45Zhiwei Yan, Guanggang Geng, Hidenori Nakazato, Yong-Jin Park. Secure and Scalable Deployment of Resource Public Key Infrastructure (RPKI)
46 -- 55R. Vidhya, M. Brindha. A novel Dynamic Key based chaotic image encryption