International Journal of Embedded Systems (IJES)

International Journal of Embedded Systems

2015 Vol.7 No.3/4

Special Issue on New Cryptographic Techniques for Large-Scale Network Security

Guest Editors: Professor Xiaofeng Chen, Professor Jin Li and Professor Duncan S. Wong

Editorial

Pages Title and author(s)
191-202Cooperative attribute-based access control for enterprise computing system
Mengting Li; Xinyi Huang; Joseph K. Liu; Li Xu; Wei Wu
DOI: 10.1504/IJES.2015.072364
203-215Proof of retrievability with efficient verification
Zhi-Yi Shao; Bo Yang
DOI: 10.1504/IJES.2015.072365
216-229Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
Chengyu Hu; Zuoxia Yu; Rupeng Yang; Qiuliang Xu; Yongbin Zhou; Qixia Yuan
DOI: 10.1504/IJES.2015.072367
230-243On the provable security of TPM2.0 cryptography APIs
Xiaobo Chu; Dengguo Feng
DOI: 10.1504/IJES.2015.072369
244-256MVP: modelling virus propagation for IPv6 wireless sensor networks
Nan Jiang; Sixin Jin; Tao Wan; Yueshun He
DOI: 10.1504/IJES.2015.072371
257-265A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
Fushan Wei; Jianfeng Ma; Chuangui Ma; Xinghua Li
DOI: 10.1504/IJES.2015.072366
266-279Energy-efficient key agreement protocols for wireless body area networks
Jingwei Liu; Qian Li; Rong Sun; Sawand Muhammad Ajmal
DOI: 10.1504/IJES.2015.072368
280-288Lightweight handover authentication with location privacy-preserving in mobile wireless networks
Ling Liu; Hanyu Quan; Xuefeng Liu; Yuqing Zhang
DOI: 10.1504/IJES.2015.072374
289-295A GAA-based batch authentication and key agreement for LTE networks
Wujun Zhang; Xiaohui Wang; Yunya Zhou; Hua Deng; Yumin Wang
DOI: 10.1504/IJES.2015.072372
296-305Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks
Satria Mandala; Md Asri Ngadi; Johan Mohamad Sharif; M. Soperi Mohd Zahid; Farhan Mohamed
DOI: 10.1504/IJES.2015.072370
306-317Anonymous hierarchical identity-based encryption without key delegation in decryption
Song Luo
DOI: 10.1504/IJES.2015.072373

Additional Papers

318-323A low energy consumption WSN node
Jun-jie Peng; Yuan-yuan Chen
DOI: 10.1504/IJES.2015.072362
324-333A secured transmission model for EPC network
Zhongwen Li; Qian Li; Zhibin Xu; Hai Jiang; Kuan-Ching Li
DOI: 10.1504/IJES.2015.072375
334-344Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering
Li Jingzhao; Ren Ping; Shi Lingling; Shunxiang Zhang
DOI: 10.1504/IJES.2015.072363