Content of Issue 16
DOI: 10.3217/jucs-019-16
|
Information Security |
I. You, E. Weippl |
2347 |
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing |
X. Xie, H. Ma, J. Li, X. Chen |
2349 |
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier |
L. Marin, A.J. Jara, A.F. Skarmeta |
2368 |
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs |
Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo |
2385 |
Graph-based KNN Algorithm for Spam SMS Detection |
T.P. Ho, H.-S. Kang, S.-R. Kim |
2404 |
A Security Real-time Privacy Amplification Scheme in QKD System |
B. Liu, B. Zhao, B. Liu, C. Wu |
2420 |
Security Issues and Attacks on the GSM Standard: a Review |
G. Cattaneo, G. De Maio, U. Ferraro Petrillo |
2437 |
Observations of Skipjack-like Structure with SP/SPS Round Function |
T. Cui, C. Jin, G. Zhang |
2453 |
Text Analysis for Monitoring Personal Information Leakage on Twitter |
D. Choi, J. Kim, X. Piao, P. Kim |
2472 |