Content of Issue 3
DOI: 10.3217/jucs-021-03
|
Recent Advances in Security and Privacy in Big Data |
Y. Yu, Y. Mu, G. Ateniese |
365 |
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence |
J. Choi, C. Choi, I. You, P. Kim |
369 |
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks |
X. Wang, L. Xu, S. Zhou, J.K. Liu |
384 |
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks |
C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu |
406 |
Restricted Identification Secure in the Extended Canetti-Krawczyk Model |
L. Hanzlik, M. KutyĆowski |
419 |
Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage |
Q. Xia, J. Ni, A.J.B.A. Kanpogninge, J.C. Gee |
440 |
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure |
Z. Liu, H. Yan, Z. Lin, L. Xu |
454 |
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage |
H. Liu, L. Chen, Z. Davar, M.R. Pour |
473 |
Multi-Authority Attribute-Based Encryption Scheme from Lattices |
G. Zhang, J. Qin, S. Qazi |
483 |