Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 25

Content of Issue 1
Managing Editor's Column C. Gütl 1
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection R. Kozik, M. Choras, J. Keller 2
A Systematic Mapping Study on Soft Skills in Software Engineering G. Matturro, F. Raschetti, C. Fontán 16
Pinhão: An Auto-tunning System for Compiler Optimizations Guided by Hot Functions M.Y. Siraichi, C.H. Segawa Tonetti, A.F. da Silva 42
Content of Issue 2
Managing Editor's Column C. Gütl 73
Methods for Information Hiding in Open Social Networks J. Bieniasz, K. Szczypiorski 74
Sorting Permutations by λ-Operations G.H. Santos Miranda, C. Negri Lintzmayer, Z. Dias 98
Designing a Human Computation Framework to Enhance Citizen-Government Interaction K. Zabaleta, U. Lopez-Novoa, I. Pretel, D. López-de-Ipiña, V. Cartelli, G. Di Modica, O. Tomarchio 122
Content of Issue 3
Advances of Provable Security Techniques Y. Yu, Y. Mu 154
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms Y. Chen, Q. Dong, Y. Li, Q. Lai, Z. Wang 158
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption Y.-F. Tseng, C.-I. Fan, C.-W. Lin 182
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method X. Tao, L. Liu, F. Zhao, Y. Huang, S. Zhu, Y. Liang 203
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption Y. Wang, J. Wang, S.-F. Sun, J.K. Liu, W. Susilo, J. Baek, I. You, X. Chen 222
CCA-Secure Deterministic Identity-Based Encryption Scheme M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang 245
Combination Model of Heterogeneous Data for Security Measurement X. Dong, Y. Guo, F. Li, L. Dong, A. Khan 270
An Identity-Based Signcryption on Lattice without Trapdoor X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu 282
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries B. Santoso, C. Su 294