Journal cover image

Browse issues

Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of High Performance Computing and Networking

2016 Vol. 9 No. 5/6

Special Issue on Cryptography and its Applications

Guest Editors: Professor Deqing Zou, Professor Bo Zhao and Dr. Xiaojing Ma


PagesTitle and authors
357-371Remote attestation approach by cross-layer security policy translation
Lingbo Jiang; Yuping Wang; Tiehua Wen; Jianfeng Tan
DOI: 10.1504/IJHPCN.2016.10001323

372-381An e-commerce trust model based on expanded subjective logic
Junfeng Tian; Hongqiang Jiao; Baomin Wang; Chao Chen
DOI: 10.1504/IJHPCN.2016.10001324

382-393Two image encryption methods with hiding effect based on moiré pattern
Qian Gao; Zhen Han; Yongzhong He; Daoshun Wang
DOI: 10.1504/IJHPCN.2016.10001325

394-400On the k-error linear complexity of generalised cyclotomic sequences
Longfei Liu; Xiaoyuan Yang; Xiaoni Du; Bin Wei
DOI: 10.1504/IJHPCN.2016.10001326

401-408Utility-based anonymisation for dataset with multiple sensitive attributes
Lixia Wang; Qing Zhu
DOI: 10.1504/IJHPCN.2016.10001327

409-416An anonymity mechanism with reduced server-side cost in peer-to-peer networks
Hao Peng; Dandan Zhao; Jianmin Han; Jianfeng Lu
DOI: 10.1504/IJHPCN.2016.10001328

417-422Efficient fully homomorphic encryption with circularly secure key switching process
Tanping Zhou; Xiaoyuan Yang; Wei Zhang; Liqiang Wu
DOI: 10.1504/IJHPCN.2016.10001329

423-430A novel GPU resources management and scheduling system based on virtual machines
Linchen Yu; Hong Yao; Xiaofei Liao
DOI: 10.1504/IJHPCN.2016.10001330

431-442Security risk analysis of IaaS based on the abstract state machine model
Xiang Shuang; Zhao Bo; Xiao Yu; An Yang
DOI: 10.1504/IJHPCN.2016.10001331

443-450Deterministic attribute-based encryption
Yanfeng Shi; Jiqiang Liu; Zhen Han; Shuo Qiu
DOI: 10.1504/IJHPCN.2016.10001332

451-461Application of game theory for dynamic access control in security systems
Yixuan Zhang; Jingsha He; Bin Zhao; Ruohong Liu
DOI: 10.1504/IJHPCN.2016.10001333

462-469A dynamic active shield against shield rerouting attack
Ting Feng; Kenli Li; Yunchuan Qin; Siyang Yu
DOI: 10.1504/IJHPCN.2016.10001334

470-479BeCFI: detecting hidden control flow with performance monitoring counters
HongWei Zhou; WenChang Shi; JinHui Yuan; FuLin Li
DOI: 10.1504/IJHPCN.2016.10001335

480-488Research on generating good key sequence based on chaos
Jing-jing Wang; Jia-yong Chen; Xiao-yuan Yang
DOI: 10.1504/IJHPCN.2016.10001336

Additional Paper

489-498Efficient key management for publish/subscribe system in cloud scenarios
Zongmin Cui; Guangyong Gao; Caixue Zhou; Jing Yu; Anyuan Deng; Changshou Deng
DOI: 10.1504/IJHPCN.2016.10001339