Journal cover image

Browse issues


Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Protocol Technology

2014 Vol. 8 No. 2/3

Special Issue on Innovative Mobile and Internet Technologies

Guest Editors: Professor Ilsun You, Professor Jinshu Su, Professor Qin Xin and Professor Baokang Zhao

 

Editorial
PagesTitle and authors
58-76A data flow-oriented specification method for analysing network security configurations
Hicham El-Khoury; Romain Laborde; François Barrère; Abdelmalek Benzekri; Maroun Chamoun
DOI: 10.1504/IJIPT.2014.066378

77-86Intrusion detection method based on nonlinear correlation measure
Mohammed A. Ambusaidi; Zhiyuan Tan; Xiangjian He; Priyadarsi Nanda; Liang Fu Lu; Aruna Jamdagni
DOI: 10.1504/IJIPT.2014.066377

87-95An efficient quantum anonymous communication with hybrid entanglement swapping
Xiaoping Lou; Jun Dai; Zhigang Chen; Moon Ho Lee
DOI: 10.1504/IJIPT.2014.066360

96-106Efficient constructions of certificate-based key encapsulation mechanism
Yang Lu; Jiguo Li
DOI: 10.1504/IJIPT.2014.066374

107-115Efficient identity-based threshold signature scheme from bilinear pairings in standard model
Fei Li; Wei Gao; Guilin Wang; Kefei Chen; Xueli Wang
DOI: 10.1504/IJIPT.2014.066373

116-121High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes
Li Zhang; Ying Guo; Dazu Huang
DOI: 10.1504/IJIPT.2014.066380

122-129LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing
Wei Ren; Jiahua Lin; Qiang Cao; Liangli Ma
DOI: 10.1504/IJIPT.2014.066375

130-142Modelling, analysis and containment of passive worms in P2P networks
Wei Yang; Yong-peng Gao; Zhi-liang Zhu; Gui-ran Chang; Yu Yao
DOI: 10.1504/IJIPT.2014.066379

143-149Quantum states sharing in the relay system with teleportation of non-maximally entanglement
Jinjing Shi; Ronghua Shi; Yin Li; Ye Kang; Xiaoqi Peng
DOI: 10.1504/IJIPT.2014.066376

150-157The algorithm model for cumulative vulnerability risk assessment
Yong Yan Chen; Hong Chun Shu
DOI: 10.1504/IJIPT.2014.066362