


default search action
The Computer Journal, Volume 61
Volume 61, Number 1, January 2018
Original Articles
- Xinju Zhang:

Multi-state System Reliability Analysis Based on Fuzzy Colored Petri Nets. 1-13 - Chin-Chia Wu

, Shang-Chia Liu, Chuanli Zhao, Sheng-Zhi Wang, Win-Chin Lin:
A Multi-Machine Order Scheduling with Learning Using the Genetic Algorithm and Particle Swarm Optimization. 14-31 - Jurairat Phuttharak, Seng W. Loke:

LogicCrowd: Crowd-Powered Logic Programming Based Mobile Applications. 32-46 - Ji-Bo Wang, Lin Li:

Machine Scheduling with Deteriorating Jobs and Modifying Maintenance Activities. 47-53 - Hon-Chan Chen, Tzu-Liang Kung, Lih-Hsing Hsu:

An Augmented Pancyclicity Problem of Crossed Cubes. 54-62 - Nidhi Kalra, Ajay Kumar

:
Deterministic Deep Pushdown Transducer and its Parallel Version. 63-73 - Juan Carlos Saez

, Adrian Pousa
, Armando De Giusti, Manuel Prieto
:
On the Interplay Between Throughput, Fairness and Energy Efficiency on Asymmetric Multicore Processors. 74-94 - Nisha Chaurasia

, Shashikala Tapaswi, Joydip Dhar
:
A Resource Efficient Expectation Maximization Clustering Approach for Cloud. 95-104 - Zhenyou Wang, Cuntao Xiao, Xianwei Lin, Yuan-Yuan Lu:

Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity. 105-110 - Wojciech Mula, Nathan Kurz, Daniel Lemire:

Faster Population Counts Using AVX2 Instructions. 111-120 - Jou-Ming Chang

, Jinn-Shyong Yang, Shyue-Ming Tang, Kung-Jui Pai:
The Wide Diameters of Regular Hyper-Stars and Folded Hyper-Stars. 121-128 - Xiaoyan Li

, Jianxi Fan, Cheng-Kuan Lin, Xiaohua Jia:
Diagnosability Evaluation of the Data Center Network DCell. 129-143 - Xiaodong Meng, Minyi Guo, Jingyu Zhang

:
An Efficient Graph Query Framework with Structural Recursion. 144-157 - Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun

:
Corrigendum: A Team Formation Model with Personnel Work Hours and Project Workload Quantified. 158
Volume 61, Number 2, February 2018
Original Articles
- Saurabh K. Pandey

, Mukesh A. Zaveri:
Quasi Random Deployment and Localization in Layered Framework for the Internet of Things. 159-179 - Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang:

Modeling and Analysis of High Availability Techniques in a Virtualized System. 180-198 - Natarajan Meghanathan

:
Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks. 199-222 - I Karthiga, Sharmila Sankar

:
Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN. 223-232 - Tahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib:

Exploration of Storage Architectures for Enterprise Network. 233-247 - Subramaniam Sarathambekai, Kandaswamy Umamaheswari:

Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems. 248-263 - Bang Chul Jung

, Jae Sook Yoo, Woongsup Lee
:
A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks. 264-272 - Jigang Wu, Long Chen

, Xu Wang, Guiyuan Jiang, Siew-Kei Lam, Thambipillai Srikanthan:
Algorithms for Replica Placement and Update in Tree Network. 273-287 - Lin Lyu

, Shengli Liu, Shuai Han:
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security. 288-318
Volume 61, Number 3, March 2018
- Mona Taghavi, Jamal Bentahar

, Kaveh Bakhtiyari
, Chihab Hanachi:
New Insights Towards Developing Recommender Systems. 319-348 - Iqbal H. Sarker

, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior. 349-368 - Prashant K. Srivastava

, Ashish Khare
:
Content-Based Image Retrieval using Local Binary Curvelet Co-occurrence Pattern - A Multiresolution Technique. 369-385 - Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally:

Structural analysis and classification of search interfaces for the deep web. 386-398 - Jeremy Barnett, Philip C. Treleaven:

Algorithmic Dispute Resolution - The Automation of Professional Dispute Resolution Using AI and Blockchain Technologies. 399-408 - Zhou Shao, Muhammad Aamir Cheema, David Taniar

:
Trip Planning Queries in Indoor Venues. 409-426 - Chitra M. Subramanian, Aneesh Krishna

, Arshinder Kaur
:
Game Theory-Based Requirements Analysis in the i* Framework. 427-446 - Meng-Jia Zhang, Kang Zhang, Jie Li, Yi-Na Li

:
Visual Exploration of 3D Geospatial Networks in a Virtual Reality Environment. 447-458 - Hazem Hiary

, Rawan Zaghloul
, Moh'd Belal Al-Zoubi
:
Single-Image Shadow Detection using Quaternion Cues. 459-468
Volume 61, Number 4, April 2018
Original Articles
- Jianhong Zhang

, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. 469-471 - Emma Osborn

, Andrew Simpson
:
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study. 472-495 - Haiqin Wu

, Liangmin Wang
, Shunrong Jiang:
Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments. 496-511 - Tran Viet Xuan Phuong, Guomin Yang

, Willy Susilo
:
Criteria-Based Encryption. 512-525 - Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. 526-538 - Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. 539-544 - Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo

, Xiaolei Dong:
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. 545-560 - Qiqi Lai, Bo Yang, Yong Yu

, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. 561-574 - Husen Wang, Qiang Tang

:
Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE. 575-585 - Yanwei Zhou

, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. 586-600 - Kamalkumar R. Macwan

, Sankita J. Patel:
k-NMF Anonymization in Social Network Data Publishing. 601-613 - Kaushal A. Shah

, Devesh C. Jinwala
:
Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks. 614-628
Volume 61, Number 5, May 2018
Original Articles
- Shuanglong Kan, Zhiqiu Huang:

Partial Order Reduction for the full Class of State/Event Linear Temporal Logic. 629-644 - Lalit Mohan Goyal

, M. M. Sufyan Beg
, Tanvir Ahmad
:
An Efficient Framework for Mining Association Rules in the Distributed Databases. 645-657 - Liangze Yin, Wei Dong, Fei He, Ji Wang:

A True-Concurrency Encoding for BMC of Compositional Systems. 658-671 - Mei-Mei Gu

, Rong-Xia Hao
, Yan-Quan Feng
, Ai-Mei Yu:
The 3-extra Connectivity and Faulty Diagnosability. 672-686 - Edans Flavius de Oliveira Sandes, George Luiz Medeiros Teodoro, Maria Emília M. T. Walter

, Xavier Martorell, Eduard Ayguadé, Alba Cristina Magalhaes Alves de Melo
:
Formalization of Block Pruning: Reducing the Number of Cells Computed in Exact Biological Sequence Comparison Algorithms. 687-713 - Liqiong Xu, Shuming Zhou, Guanqin Lian, Zuwen Luo:

A Kind of Conditional Connectivity of Cayley Graphs Generated by 2-trees. 714-721 - Mosong Zhou

, Xiaoshe Dong
, Heng Chen, Xingjun Zhang:
A Runtime Available Resource Capacity Evaluation Model Based on the Concept of Similar Tasks. 722-744 - Yi Qi, Huan Li, Zhongzhi Zhang

:
Extended Corona Product as an Exactly Tractable Model for Weighted Heterogeneous Networks. 745-760 - Shiying Wang, Guozhen Zhang, Kai Feng:

Edge Fault Tolerance of Cartesian Product Graphs on Super Restricted Edge Connectivity. 761-772 - Andrea Farruggia, Travis Gagie

, Gonzalo Navarro, Simon J. Puglisi
, Jouni Sirén:
Relative Suffix Trees. 773-788
Volume 61, Number 6, June 2018
Original Articles
- Feng Dan, Yajie Ma, Fengxing Zhou, Xiaomao Wang, Kai He:

A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment. 789-797 - Tua Agustinus Tamba

:
On Handelman's Representation of Network Utility Maximization. 798-807 - Giuseppe Lettieri

, Vincenzo Maffione, Luigi Rizzo:
A Study of I/O Performance of Virtual Machines. 808-831 - Atul Tripathi, Isha Pathak, Deo Prakash Vidyarthi:

Energy Efficient VM Placement for Effective Resource Utilization using Modified Binary PSO. 832-846 - Jyotshana Kanti, Geetam Singh Tomar

:
Solution of sensing failure problem: an improved two-stage detector. 847-855 - Roberto Rodríguez-Rodríguez, Javier Díaz, Fernando Castro

, Pablo Ibáñez
, Daniel Chaver
, Víctor Viñals, Juan Carlos Saez
, Manuel Prieto-Matías
, Luis Piñuel, Teresa Monreal Arnal
, José María Llabería
:
Reuse Detector: Improving the Management of STT-RAM SLLCs. 856-880 - Nileshkumar R. Patel

, Shishir Kumar:
Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References. 881-895 - Ping Xie

, Jianzhong Huang, Xiao Qin
, Changsheng Xie:
SmartRec: Fast Recovery from Single Failures in Heterogeneous RAID-Coded Storage Systems. 896-911 - Francisco José Esteban

, David Díaz, Pilar Hernández, Juan Antonio Caballero, Gabriel Dorado, Sergio Gálvez
:
MC64-Cluster: Many-Core CPU Cluster Architecture and Performance Analysis in B-Tree Searches. 912-925 - Thompson Stephan, K. Suresh Joseph:

Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks. 926-936 - Tong Liu, Yanmin Zhu, Ting Wen, Jiadi Yu:

Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing. 937-948
Volume 61, Number 7, July 2018
Special Issue on Socially Aware Networking
- Chao Tong, Xiang Yin, Jun Li

, Tongyu Zhu, Renli Lv, Liang Sun, Joel J. P. C. Rodrigues:
A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. 949-958 - Jieren Cheng, Jinghe Zhou

, Qiang Liu
, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. 959-970 - Noor Ullah

, Xiangjie Kong
, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia
:
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. 971-986 - Jiaqi Wang, Yunyao Lu, Xiaojie Wang

, Jing Dong, Xiping Hu
:
SAR: A Social-Aware Route Recommendation System for Intelligent Transportation. 987-997 - Mostafa Haghir Chehreghani

, Albert Bifet
, Talel Abdessalem:
Discriminative Distance-Based Network Indices with Application to Link Prediction. 998-1014
- Xiaogang Fu, Jianyong Sun

:
Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition. 1015-1037 - Alexey Stakhov:

Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases. 1038-1063 - Yonghong Hou, Lin Xue, Shuo Li

, Jiaming Xing:
User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming. 1064-1074 - Wassim Derguech

, Sami Bhiri, Edward Curry:
Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve. 1075-1098 - C. Harriet Linda

, G. Wiselin Jiji:
Hierarchical Approach to Detect Fractures in CT DICOM Images. 1099-1108
Volume 61, Number 8, August 2018
Original Articles
- Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:

A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. 1109-1122 - Rong Wang

, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. 1123-1132 - Haijiang Wang

, Xiaolei Dong, Zhenfu Cao
, Dongmei Li:
Secure and Efficient Attribute-Based Encryption with Keyword Search. 1133-1142 - Gunikhan Sonowal

, K. S. Kuppusamy:
SmiDCA: An Anti-Smishing Model with Machine Learning Approach. 1143-1157 - Rongjia Li, Chenhui Jin:

Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128. 1158-1165 - Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:

Fault Attack on ACORN v3. 1166-1179 - Amir Daneshgar

, Fahimeh Mohebbipoor:
A Secure Self-Synchronized Stream Cipher. 1180-1201 - Baoguo Yuan, Junfeng Wang

, Zhiyang Fang, Li Qi:
A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection. 1202-1215 - Jianye Huang, Qiong Huang, Willy Susilo

:
Leakage-Resilient Dual-Form Signatures. 1216-1227 - Dianyan Xiao, Yang Yu

:
Klepto for Ring-LWE Encryption. 1228-1239 - Jianchang Lai, Yi Mu, Fuchun Guo

, Peng Jiang
, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. 1240-1251 - Ya Liu

, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. 1252-1258 - Baodong Qin, Qinglan Zhao, Dong Zheng:

Bounded Revocable and Outsourceable ABE for Secure Data Sharing. 1259-1268
Volume 61, Number 9, September 2018
Original Articles
- Beiyang Zhang

, Xiedong Zhang, Zhihua Zhang
:
Nested-Stacking Genetic Algorithm for the Optimal Placement of Sensors in Bridge. 1269-1283 - Jialei Liu

, Shangguang Wang
, Ao Zhou, Xiang Xu, Sathish A. P. Kumar, Fangchun Yang:
Towards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud. 1284-1295 - Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:

Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. 1296-1305 - Walayat Hussain

, Farookh Khadeer Hussain, Omar Hussain
, Ravindra Bagia, Elizabeth Chang
:
Risk-based framework for SLA violation abatement from the cloud service provider's perspective. 1306-1322 - Jian Jin, Ping Ji

:
Scheduling jobs with resource-dependent ready times and processing times depending on their starting times and positions. 1323-1328 - Ji-Bo Wang, Xin-Na Geng, Lu Liu, Jian-Jun Wang

, Yuan-Yuan Lu:
Single Machine CON/SLK Due Date Assignment Scheduling with Controllable Processing Time and Job-dependent Learning Effects. 1329-1337 - Shufeng Kong

, Sanjiang Li
, Michael Sioutis
:
Exploring Directional Path-Consistency for Solving Constraint Networks. 1338-1350 - Simone Faro

, Arianna Pavone
:
An Efficient Skip-Search Approach to Swap Matching. 1351-1360 - Nurul Liyana Mohamad Zulkufli

, Sherzod Turaev
, Mohd Izzuddin Bin Mohd Tamrin
, Azeddine Messikh
:
Watson-Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm. 1361-1373 - Andrea Pinna

, Roberto Tonelli, Matteo Orrù, Michele Marchesi:
A Petri Nets Model for Blockchain Analysis. 1374-1388 - Samuel Tweneboah-Koduah, William J. Buchanan

:
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. 1389-1406 - Pedro Álvarez

, Sergio Hernández, Javier Fabra, Joaquín Ezpeleta:
Cost-driven provisioning and execution of a computing-intensive service on the Amazon EC2. 1407-1421 - Ji-Bo Wang, Lu Liu, Jian-Jun Wang

, Lin Li:
Makespan minimization scheduling with ready times, group technology and shortening job processing times. 1422-1428
Volume 61, Number 10, October 2018
Original Articles
- Leonildo José de Melo de Azevedo, Júlio Cezar Estrella, Luis Hideo Vasconcelos Nakamura

, Marcos José Santana, Regina H. C. Santana, Claudio Fabiano Motta Toledo, Bruno G. Batista, Stephan Reiff-Marganiec
:
Optimized Service Level Agreement Establishment in Cloud Computing. 1429-1442 - Zhenni Feng, Yanmin Zhu, Hui Cai, Pingyi Luo:

Optimal Distributed Auction for Mobile Crowd Sensing. 1443-1459 - Yunus Ozen

, Cüneyt Bayilmis
:
urgMAC: A New Traffic and QoS-aware Cross-Layer MAC protocol for Wireless Multimedia Sensor Networks. 1460-1467 - Soumya Das

, Tamaghna Acharya
:
Faulty Node Detection in HMM-Based Cooperative Spectrum Sensing For Cognitive Radio Networks. 1468-1478 - Reza Entezari-Maleki

, Kishor S. Trivedi, Leonel Sousa, Ali Movaghar:
Performability-Based Workflow Scheduling in Grids. 1479-1495 - Maroua Meddeb, Amine Dhraief

, Abdelfettah Belghith
, Thierry Monteil, Khalil Drira, Saad Al-Ahmadi
:
Cache Freshness in Named Data Networking for the Internet of Things. 1496-1511 - Margarida Mamede

, José Legatheaux Martins, João Horta:
BOUQUET - Aggregating Network Paths in Trees to Reduce Data-Plane Forwarding State. 1512-1522 - Gobalakrishnan Natesan

, C. Arun:
A New Multi-Objective Optimal Programming Model for Task Scheduling using Genetic Gray Wolf Optimization in Cloud Computing. 1523-1536 - Frédéric Giroire, Nicolas Huin, Joanna Moulierac

, Truong Khoa Phan:
Energy-Aware Routing in Software-Defined Network using Compression. 1537-1556 - Anubis Graciela de Moraes Rossetto

, Cláudio F. R. Geyer, Luciana Arantes, Pierre Sens:
Impact FD: An Unreliable Failure Detector Based on Process Relevance and Confidence in the System. 1557-1576 - S. Renuga, S. S. K. Jagatheeshwari:

Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm. 1577-1588
Volume 61, Number 11, November 2018
Original Articles
- Himangshu Sarma

, Robert Porzel, Jan D. Smeddinck, Rainer Malaka
, Arun B. Samaddar:
A Text to Animation System for Physical Exercises. 1589-1604 - Qirong Mao, Feifei Zhang, Liangjun Wang, Sidian Luo, Ming Dong:

Cascaded Multi-level Transformed Dirichlet Process for Multi-pose Facial Expression Recognition. 1605-1619 - Ammar Sohail, Muhammad Aamir Cheema, David Taniar:

Social-Aware Spatial Top-k and Skyline Queries. 1620-1638 - Md. Mosaddek Khan, Long Tran-Thanh, Sarvapali D. Ramchurn, Nicholas R. Jennings

:
Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs. 1639-1666 - Sunny Rai

, Shampa Chakraverty, Devendra K. Tayal, Yash Kukreti:
A Study on Impact of Context on Metaphor Detection. 1667-1682 - Chandra Prakash, Rajesh Kumar

, Namita Mittal
:
Optimized Clustering Techniques for Gait Profiling in Children with Cerebral Palsy for Rehabilitation. 1683-1694 - Zhenjun Tang

, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. 1695-1709 - Zhi-Fang Yang, Chih-Ting Kuo, Te-Hsi Kuo:

Authorization Identification by Watermarking in Log-polar Coordinate System. 1710-1723 - Zhi-jie Liang

, Sheng-bin Liao, Bing-zhang Hu:
3D Convolutional Neural Networks for Dynamic Sign Language Recognition. 1724-1736 - Hamid Hassanpour

, N. Nowrozian, Mohammad Mahdi AlyanNezhadi
, Najmeh Samadiani
:
Image Zooming Using a Multi-layer Neural Network. 1737-1748
Volume 61, Number 12, December 2018
Invited Paper
- David W. Archer, Dan Bogdanov

, Yehuda Lindell
, Liina Kamm
, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright:
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation. 1749-1771
- Eunsung Lee, Sang Woo Kim:

Non-interactive Conditional Proxy Re-Signature in the Standard Model. 1772-1782 - Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia:

Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm. 1783-1790 - Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:

On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. 1791-1793 - Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han:

Computational Robust Fuzzy Extractor. 1794-1805 - Yi Dou, Henry C. B. Chan

, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. 1806-1824 - Shuai Han, Shengli Liu, Lin Lyu

, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. 1825-1844 - Biao Wang

, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. 1845-1861 - Yung-Ting Chuang

, Yi-Fan Lee:
Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. 1862-1879 - Jinhui Liu, Yong Yu

, Bo Yang, Jianwei Jia, Shijia Wang
, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. 1880-1896 - Qingwen Guo

, Qiong Huang, Guomin Yang
:
Authorized Function Homomorphic Signature. 1897-1908

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














