Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 19

Content of Issue 16
DOI: 10.3217/jucs-019-16
T.P. Ho, H.-S. Kang, S.-R. Kim 2004
Information Security I. You, E. Weippl 2347
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing X. Xie, H. Ma, J. Li, X. Chen 2349
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier L. Marin, A.J. Jara, A.F. Skarmeta 2368
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo 2385
A Security Real-time Privacy Amplification Scheme in QKD System B. Liu, B. Zhao, B. Liu, C. Wu 2420
Security Issues and Attacks on the GSM Standard: a Review G. Cattaneo, G. De Maio, U. Ferraro Petrillo 2437
Observations of Skipjack-like Structure with SP/SPS Round Function T. Cui, C. Jin, G. Zhang 2453
Text Analysis for Monitoring Personal Information Leakage on Twitter D. Choi, J. Kim, X. Piao, P. Kim 2472