Journal cover image

Browse issues

Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Grid and Utility Computing

2013 Vol. 4 No. 2/3


PagesTitle and authors
95-102Access control requirements for structured document in cloud computing
Zhiqiang Yao; Jinbo Xiong; Jianfeng Ma; Qi Li; Ximeng Liu
DOI: 10.1504/IJGUC.2013.056244

103-109Fairness in the presence of semi-rational parties in rational two-party secure computation
Zhonghong Sun
DOI: 10.1504/IJGUC.2013.056245

110-118Secure and efficient design of software block cipher implementations on microcontrollers
Alessandro Barenghi; Gerardo Pelosi; Federico Terraneo
DOI: 10.1504/IJGUC.2013.056246

119-127Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
Wazir Zada Khan; Mohamad Naufal bin Mohamad Saad; Mohammed Y. Aalsalem
DOI: 10.1504/IJGUC.2013.056247

128-133Fairness analysis of e-commerce protocols based on strand spaces
Yichun Liu
DOI: 10.1504/IJGUC.2013.056248

134-143A novel vulnerability detection method for ZigBee MAC layer
Siwei Peng; Baojiang Cui; Ru Jia; Shurui Liang; Yiying Zhang
DOI: 10.1504/IJGUC.2013.056249

144-150Privacy-preserving logistic regression outsourcing in cloud computing
Xu Dong Zhu; Hui Li; Feng Hua Li
DOI: 10.1504/IJGUC.2013.056250

151-159An efficient attribute-based signature scheme with claim-predicate mechanism
Changji Wang; Wentao Li
DOI: 10.1504/IJGUC.2013.056251

160-168Fine-grained access control for cloud computing
Xinfeng Ye; Bakh Khoussainov
DOI: 10.1504/IJGUC.2013.056252

169-177Anti-cropping digital image watermarking using Sudoku
Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
DOI: 10.1504/IJGUC.2013.056253

178-186Visual analytics for intrusion detection in spam emails
Jinson Zhang; Mao Lin Huang; Doan Hoang
DOI: 10.1504/IJGUC.2013.056254

187-196Leakage-resilient identity-based encryption scheme
Sujuan Li; Futai Zhang
DOI: 10.1504/IJGUC.2013.056255

197-203How network coding system constrains packet pollution attacks in wireless sensor networks
Yuanyuan Zhang; Marine Minier
DOI: 10.1504/IJGUC.2013.056256

204-211FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
Guangye Sui; Mohamed Mejri
DOI: 10.1504/IJGUC.2013.056257

212-218Linear threshold verifiable secret sharing in bilinear groups
Jie Zhang; Futai Zhang
DOI: 10.1504/IJGUC.2013.056258