Journal cover image

Browse issues

Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of High Performance Systems Architecture

2014 Vol. 5 No. 1

Special Issue on Network Computing and its Security

Guest Editors: Professor Jin Li and Professor Fatos Xhafa


PagesTitle and authors
3-12Private mutual authentications with fuzzy matching
Yamin Wen; Zheng Gong
DOI: 10.1504/IJHPSA.2014.059860

13-18Computing the PUE of data centres by leveraging workload fluctuation
Yongmei Xu; Yuihui Deng; Lan Du
DOI: 10.1504/IJHPSA.2014.059861

19-24On provably secure code-based multiple grade proxy signature scheme
Yan Ren; Yunhong Hu; Hongbin Wang
DOI: 10.1504/IJHPSA.2014.059865

25-32Public-key searchable encryption from lattices
Changjiang Hou; Fei Liu; Hongtao Bai; Lanfang Ren
DOI: 10.1504/IJHPSA.2014.059867

33-38A novel approach to generate and extract audio watermark
Chundong Wang; Guangming Bo
DOI: 10.1504/IJHPSA.2014.059869

39-49Research on born-digital image text extraction based on conditional random field
Zhang Jian; Cheng RenHong; Wang Kai; Zhao Hong
DOI: 10.1504/IJHPSA.2014.059873

50-62Enhancing the search ability of differential evolution through competent leader
Yiqiao Cai; Jixiang Du; Weibin Chen
DOI: 10.1504/IJHPSA.2014.059875

63-69STSHC: secure and trusted scheme for Hadoop cluster
Quan Zhou; Daixian Wu; Chunming Tang; Chunming Rong
DOI: 10.1504/IJHPSA.2014.059874