Log in
Log in
For authors, reviewers, editors and board members
Username
Remember me
Go
Forgotten?
Help
Sitemap
Home
For Authors
For Librarians
Orders
Inderscience
Online
News
International Journal of Grid and Utility Computing
Published issues
2013 Vol.4 No.2/3
International Journal of Grid and Utility Computing
2013 Vol.4 No.2/3
Pages
Title and author(s)
95-102
Access control requirements for structured document in cloud computing
Zhiqiang Yao; Jinbo Xiong; Jianfeng Ma; Qi Li; Ximeng Liu
DOI
:
10.1504/IJGUC.2013.056244
103-109
Fairness in the presence of semi-rational parties in rational two-party secure computation
Zhonghong Sun
DOI
:
10.1504/IJGUC.2013.056245
110-118
Secure and efficient design of software block cipher implementations on microcontrollers
Alessandro Barenghi; Gerardo Pelosi; Federico Terraneo
DOI
:
10.1504/IJGUC.2013.056246
119-127
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
Wazir Zada Khan; Mohamad Naufal bin Mohamad Saad; Mohammed Y. Aalsalem
DOI
:
10.1504/IJGUC.2013.056247
128-133
Fairness analysis of e-commerce protocols based on strand spaces
Yichun Liu
DOI
:
10.1504/IJGUC.2013.056248
134-143
A novel vulnerability detection method for ZigBee MAC layer
Siwei Peng; Baojiang Cui; Ru Jia; Shurui Liang; Yiying Zhang
DOI
:
10.1504/IJGUC.2013.056249
144-150
Privacy-preserving logistic regression outsourcing in cloud computing
Xu Dong Zhu; Hui Li; Feng Hua Li
DOI
:
10.1504/IJGUC.2013.056250
151-159
An efficient attribute-based signature scheme with claim-predicate mechanism
Changji Wang; Wentao Li
DOI
:
10.1504/IJGUC.2013.056251
160-168
Fine-grained access control for cloud computing
Xinfeng Ye; Bakh Khoussainov
DOI
:
10.1504/IJGUC.2013.056252
169-177
Anti-cropping digital image watermarking using Sudoku
Shamsul Kamal Ahmad Khalid; Mustafa Mat Deris; Kamaruddin Malik Mohamad
DOI
:
10.1504/IJGUC.2013.056253
178-186
Visual analytics for intrusion detection in spam emails
Jinson Zhang; Mao Lin Huang; Doan Hoang
DOI
:
10.1504/IJGUC.2013.056254
187-196
Leakage-resilient identity-based encryption scheme
Sujuan Li; Futai Zhang
DOI
:
10.1504/IJGUC.2013.056255
197-203
How network coding system constrains packet pollution attacks in wireless sensor networks
Yuanyuan Zhang; Marine Minier
DOI
:
10.1504/IJGUC.2013.056256
204-211
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test
Guangye Sui; Mohamed Mejri
DOI
:
10.1504/IJGUC.2013.056257
212-218
Linear threshold verifiable secret sharing in bilinear groups
Jie Zhang; Futai Zhang
DOI
:
10.1504/IJGUC.2013.056258
Sign up for new issue alerts
Subscribe/buy articles/issues
View sample articles
Latest issue contents as RSS feed
Forthcoming articles
Journal information in easy print format (PDF)
Publishing with Inderscience: ethical statement
Recommend to a librarian (PDF)
Feedback to Editor
Get permission to reproduce content
Find related journals
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Our Newsletter
(
subscribe for free
)
RSS Feeds
New issue alerts
Return to top