Journal cover image

Browse issues

Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Embedded Systems

2015 Vol. 7 No. 3/4

Special Issue on New Cryptographic Techniques for Large-Scale Network Security

Guest Editors: Professor Xiaofeng Chen, Professor Jin Li and Professor Duncan S. Wong


PagesTitle and authors
191-202Cooperative attribute-based access control for enterprise computing system
Mengting Li; Xinyi Huang; Joseph K. Liu; Li Xu; Wei Wu
DOI: 10.1504/IJES.2015.072364

203-215Proof of retrievability with efficient verification
Zhi-Yi Shao; Bo Yang
DOI: 10.1504/IJES.2015.072365

216-229Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
Chengyu Hu; Zuoxia Yu; Rupeng Yang; Qiuliang Xu; Yongbin Zhou; Qixia Yuan
DOI: 10.1504/IJES.2015.072367

230-243On the provable security of TPM2.0 cryptography APIs
Xiaobo Chu; Dengguo Feng
DOI: 10.1504/IJES.2015.072369

244-256MVP: modelling virus propagation for IPv6 wireless sensor networks
Nan Jiang; Sixin Jin; Tao Wan; Yueshun He
DOI: 10.1504/IJES.2015.072371

257-265A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
Fushan Wei; Jianfeng Ma; Chuangui Ma; Xinghua Li
DOI: 10.1504/IJES.2015.072366

266-279Energy-efficient key agreement protocols for wireless body area networks
Jingwei Liu; Qian Li; Rong Sun; Sawand Muhammad Ajmal
DOI: 10.1504/IJES.2015.072368

280-288Lightweight handover authentication with location privacy-preserving in mobile wireless networks
Ling Liu; Hanyu Quan; Xuefeng Liu; Yuqing Zhang
DOI: 10.1504/IJES.2015.072374

289-295A GAA-based batch authentication and key agreement for LTE networks
Wujun Zhang; Xiaohui Wang; Yunya Zhou; Hua Deng; Yumin Wang
DOI: 10.1504/IJES.2015.072372

296-305Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
Satria Mandala; Md Asri Ngadi; Johan Mohamad Sharif; M. Soperi Mohd Zahid; Farhan Mohamed
DOI: 10.1504/IJES.2015.072370

306-317Anonymous hierarchical identity-based encryption without key delegation in decryption
Song Luo
DOI: 10.1504/IJES.2015.072373

Additional Papers

318-323A low energy consumption WSN node
Jun-jie Peng; Yuan-yuan Chen
DOI: 10.1504/IJES.2015.072362

324-333A secured transmission model for EPC network
Zhongwen Li; Qian Li; Zhibin Xu; Hai Jiang; Kuan-Ching Li
DOI: 10.1504/IJES.2015.072375

334-344Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering
Li Jingzhao; Ren Ping; Shi Lingling; Shunxiang Zhang
DOI: 10.1504/IJES.2015.072363