Login
Help
Sitemap
Home
For Authors
For Librarians
Orders
Inderscience
Online
News
International Journal of Grid and Utility Computing
Published issues
2013 Vol.4 No.2/3
International Journal of Grid and Utility Computing
2013 Vol.4 No.2/3
Pages
Title and author(s)
95-102
Access control requirements for structured document in cloud computing
Zhiqiang Yao; Jinbo Xiong; Jianfeng Ma; Qi Li; Ximeng Liu
DOI
:
10.1504/IJGUC.2013.056244
103-109
Fairness in the presence of semi-rational parties in rational two-party secure computation
Zhonghong Sun
DOI
:
10.1504/IJGUC.2013.056245
110-118
Secure and efficient design of software block cipher implementations on microcontrollers
Alessandro Barenghi; Gerardo Pelosi; Federico Terraneo
DOI
:
10.1504/IJGUC.2013.056246
119-127
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
Wazir Zada Khan; Mohamad Naufal bin Mohamad Saad; Mohammed Y. Aalsalem
DOI
:
10.1504/IJGUC.2013.056247
128-133
Fairness analysis of e-commerce protocols based on strand spaces
Yichun Liu
DOI
:
10.1504/IJGUC.2013.056248
134-143
A novel vulnerability detection method for ZigBee MAC layer
Siwei Peng; Baojiang Cui; Ru Jia; Shurui Liang; Yiying Zhang
DOI
:
10.1504/IJGUC.2013.056249
144-150
Privacy-preserving logistic regression outsourcing in cloud computing
Xu Dong Zhu; Hui Li; Feng Hua Li
DOI
:
10.1504/IJGUC.2013.056250
151-159
An efficient attribute-based signature scheme with claim-predicate mechanism
Changji Wang; Wentao Li
DOI
:
10.1504/IJGUC.2013.056251
160-168
Fine-grained access control for cloud computing
Xinfeng Ye; Bakh Khoussainov
DOI
:
10.1504/IJGUC.2013.056252
169-177
Anti-cropping digital image watermarking using Sudoku
Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
DOI
:
10.1504/IJGUC.2013.056253
178-186
Visual analytics for intrusion detection in spam emails
Jinson Zhang; Mao Lin Huang; Doan Hoang
DOI
:
10.1504/IJGUC.2013.056254
187-196
Leakage-resilient identity-based encryption scheme
Sujuan Li; Futai Zhang
DOI
:
10.1504/IJGUC.2013.056255
197-203
How network coding system constrains packet pollution attacks in wireless sensor networks
Yuanyuan Zhang; Marine Minier
DOI
:
10.1504/IJGUC.2013.056256
204-211
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
Guangye Sui; Mohamed Mejri
DOI
:
10.1504/IJGUC.2013.056257
212-218
Linear threshold verifiable secret sharing in bilinear groups
Jie Zhang; Futai Zhang
DOI
:
10.1504/IJGUC.2013.056258
Sign up for new issue alerts
Subscribe/buy articles/issues
View sample articles
Copyright and author entitlement
Forthcoming articles
Journal information in easy print format (PDF)
Publishing with Inderscience: ethical statement
Recommend to a librarian (PDF)
Feedback to Editor
Get permission to reproduce content
Find related journals
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Our Newsletter
(
subscribe for free
)
RSS Feeds
New issue alerts
Inderscience is a member of publishing organisations including:
Return to top