International Journal of Grid and Utility Computing (IJGUC)

International Journal of Grid and Utility Computing

2013 Vol.4 No.2/3


Pages Title and author(s)
95-102Access control requirements for structured document in cloud computing
Zhiqiang Yao; Jinbo Xiong; Jianfeng Ma; Qi Li; Ximeng Liu
DOI: 10.1504/IJGUC.2013.056244
103-109Fairness in the presence of semi-rational parties in rational two-party secure computation
Zhonghong Sun
DOI: 10.1504/IJGUC.2013.056245
110-118Secure and efficient design of software block cipher implementations on microcontrollers
Alessandro Barenghi; Gerardo Pelosi; Federico Terraneo
DOI: 10.1504/IJGUC.2013.056246
119-127Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
Wazir Zada Khan; Mohamad Naufal bin Mohamad Saad; Mohammed Y. Aalsalem
DOI: 10.1504/IJGUC.2013.056247
128-133Fairness analysis of e-commerce protocols based on strand spaces
Yichun Liu
DOI: 10.1504/IJGUC.2013.056248
134-143A novel vulnerability detection method for ZigBee MAC layer
Siwei Peng; Baojiang Cui; Ru Jia; Shurui Liang; Yiying Zhang
DOI: 10.1504/IJGUC.2013.056249
144-150Privacy-preserving logistic regression outsourcing in cloud computing
Xu Dong Zhu; Hui Li; Feng Hua Li
DOI: 10.1504/IJGUC.2013.056250
151-159An efficient attribute-based signature scheme with claim-predicate mechanism
Changji Wang; Wentao Li
DOI: 10.1504/IJGUC.2013.056251
160-168Fine-grained access control for cloud computing
Xinfeng Ye; Bakh Khoussainov
DOI: 10.1504/IJGUC.2013.056252
169-177Anti-cropping digital image watermarking using Sudoku
Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
DOI: 10.1504/IJGUC.2013.056253
178-186Visual analytics for intrusion detection in spam emails
Jinson Zhang; Mao Lin Huang; Doan Hoang
DOI: 10.1504/IJGUC.2013.056254
187-196Leakage-resilient identity-based encryption scheme
Sujuan Li; Futai Zhang
DOI: 10.1504/IJGUC.2013.056255
197-203How network coding system constrains packet pollution attacks in wireless sensor networks
Yuanyuan Zhang; Marine Minier
DOI: 10.1504/IJGUC.2013.056256
204-211FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
Guangye Sui; Mohamed Mejri
DOI: 10.1504/IJGUC.2013.056257
212-218Linear threshold verifiable secret sharing in bilinear groups
Jie Zhang; Futai Zhang
DOI: 10.1504/IJGUC.2013.056258