Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 21

Content of Issue 3
DOI: 10.3217/jucs-021-03
Recent Advances in Security and Privacy in Big Data Y. Yu, Y. Mu, G. Ateniese 365
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence J. Choi, C. Choi, I. You, P. Kim 369
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks X. Wang, L. Xu, S. Zhou, J.K. Liu 384
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu 406
Restricted Identification Secure in the Extended Canetti-Krawczyk Model L. Hanzlik, M. KutyƂowski 419
Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage Q. Xia, J. Ni, A.J.B.A. Kanpogninge, J.C. Gee 440
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure Z. Liu, H. Yan, Z. Lin, L. Xu 454
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage H. Liu, L. Chen, Z. Davar, M.R. Pour 473
Multi-Authority Attribute-Based Encryption Scheme from Lattices G. Zhang, J. Qin, S. Qazi 483