Journal: Mathematical and Computer Modelling

Volume 55, Issue 1-2

1 -- 2Bart Preneel, Jongsung Kim, Damien Sauveron. Advanced theory and practice for cryptography and future security
3 -- 11Hyoung Joong Kim, Soomin Lim, Jongsub Moon, Boram Kim, Eui S. Jung. A photographic forensic case study: Myths, principles and techniques
12 -- 18Leyou Zhang, Yupu Hu, Qing Wu. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
19 -- 25Jianjie Zhao, Dawu Gu, Yali Li, Wei Cheng. On weaknesses of the HDCP authentication and key exchange protocol and its repair
26 -- 34Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong. Differential fault analysis on block cipher SEED
35 -- 44Chun-Ta Li, Cheng-Chi Lee. A novel user authentication and privacy preserving scheme with smart cards for wireless communications
45 -- 57Jangseong Kim, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon. A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
58 -- 68Inyong Lee, Soonki Jeong, Sangsoo Yeo, Jongsub Moon. A novel method for SQL injection attack detection based on removing SQL query attribute values
69 -- 79JingZheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving performance of network covert timing channel through Huffman coding
80 -- 86Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia. Task-based behavior detection of illegal codes
87 -- 96Xiaopu Ma, Ruixuan Li, Zhengding Lu, Wei Wang. Mining constraints in role-based access control
97 -- 101Zhiwei Wang. A new construction of the server-aided verification signature scheme
102 -- 112Nianhua Yang, Huiqun Yu, Zhilin Qian, Hua Sun. Modeling and quantitatively predicting software security based on stochastic Petri nets
113 -- 122Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon. Authenticated public key broadcast encryption scheme secure against insiders' attack
123 -- 133Ding Lin, Guan Jie. Related key chosen IV attacks on Decim v2 and Decim-128
134 -- 141Jong Sik Moon, Im-Yeong Lee. Authentication protocol using an identifier in an ad hoc network environment
142 -- 150Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong. On the number of rotation symmetric functions over GF(p)
151 -- 160Sungsu Lim, Byeongyeong Yoo, Jungheum Park, KeunDuck Byun, Sangjin Lee. A research on the investigation method of digital forensics for a VMware Workstation's virtual machine
161 -- 169R. Padmavathy, Chakravarthy Bhagvati. Discrete logarithm problem using index calculus method
170 -- 187Jong-Hyouk Lee, Jiefeng (Terence) Chen, Thierry Ernst. Securing mobile network prefix provisioning for NEMO based vehicular networks
188 -- 197Dan Feng, Junjian Chen, Jingning Liu, Zhikun Wang. BLESS: Object level encryption security for object-based storage system
198 -- 213Fei Wang 0007, Hailong Wang, Xiaofeng Wang, Jinshu Su. A new multistage approach to detect subtle DDoS attacks
214 -- 222Hyeran Mun, Kyusuk Han, Yang-Sun Lee, Chan Yeob Yeun, Hyo Hyun Choi. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
223 -- 240Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee. On-the-spot digital investigation by means of LDFS: Live Data Forensic System
241 -- 255Peidong Zhu, Huayang Cao, Laurence Laurence Yang, Kan Chen. AS Alliance based security enhancement for inter-domain routing protocol
256 -- 267Ihor Vasyltsov, Gökay Saldamli. Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography