Journal cover image

Browse issues


Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Grid and Utility Computing

2014 Vol. 5 No. 2

 

PagesTitle and authors
71-79Hierarchical identity-based encryption without key delegation in decryption
Song Luo; Zhong Chen
DOI: 10.1504/IJGUC.2014.060182

80-86Toward quantum-resistant strong designated verifier signature
Xi Sun; Haibo Tian; Yumin Wang
DOI: 10.1504/IJGUC.2014.060187

87-95Group-based authentication and key agreement for machine-type communication
Yueyu Zhang; Jie Chen; Hui Li; Jin Cao; Chenzhe Lai
DOI: 10.1504/IJGUC.2014.060189

96-106Deadline constraint heuristic-based genetic algorithm for workflow scheduling in cloud
Amandeep Verma; Sakshi Kaushal
DOI: 10.1504/IJGUC.2014.060199

107-122Model-driven engineering of cloud components in MetaMORP(h)OSY
Francesco Moscato; Flora Amato; Alba Amato; Rocco Aversa
DOI: 10.1504/IJGUC.2014.060198

123-134Profiling e-Science infrastructures with kernel and application benchmarks
Andrea Clematis; Daniele D'Agostino; Antonella Galizia; Alfonso Quarati
DOI: 10.1504/IJGUC.2014.060204

135-148Level-based batch scheduling strategies for computational grid
Mohammad Shahid; Zahid Raza
DOI: 10.1504/IJGUC.2014.060223