International Journal of High Performance Computing and Networking (IJHPCN)

International Journal of High Performance Computing and Networking

2015 Vol.8 No.2

Special Issue on Advances in Cloud Computing Security

Guest Editors: Professor Xiaofeng Chen, Professor Xinyi Huang and Dr. Joseph K. Liu


Pages Title and author(s)
93-101Securely verifiable outsourcing schemes of matrix calculation
Can Xiang; Chunming Tang
DOI: 10.1504/IJHPCN.2015.070009
102-109Batch public auditing for distributed mobile cloud computing
Chuan Yao; Li Xu; Xinyi Huang
DOI: 10.1504/IJHPCN.2015.070010
110-123The B+-tree-based method for nearest neighbour queries in traffic simulation systems
Zhu Song; Shijie Zhou; Jiaqing Luo; Weiwei Deng
DOI: 10.1504/IJHPCN.2015.070011
124-134New identity-based key-encapsulation mechanism and its applications in cloud computing
Hao Wang; Zhihua Zheng; Bo Yang
DOI: 10.1504/IJHPCN.2015.070012
135-143A lattice-based designated verifier signature for cloud computing
Yongqiang Zhang; Qiang Liu; Chengpei Tang; Haibo Tian
DOI: 10.1504/IJHPCN.2015.070013
144-153Rating cloud storage service by collaborative remote data checking
Teng Li; Jian Mao; Yue Chen; Pei Li; Jie Chen
DOI: 10.1504/IJHPCN.2015.070014
154-166File sharing in cloud computing using win stay lose shift strategy
Yilei Wang; Willy Susilo; Tao Li; Qiuliang Xu
DOI: 10.1504/IJHPCN.2015.070016
167-175Cloud data integrity checking protocol from lattice
Xiufeng Zhao; Xiang Wang; Hao Xu; Yilei Wang
DOI: 10.1504/IJHPCN.2015.070020
176-185Lattice-based threshold cryptography and its applications in distributed cloud computing
Guoyan Zhang; Jing Qin
DOI: 10.1504/IJHPCN.2015.070021

Additional Paper

186-194Energy-efficient healthcare monitoring with smartphones and IoT technologies
Mir Sajjad Hussain Talpur; Md Zakirul Alam Bhuiyan; Guojun Wang
DOI: 10.1504/IJHPCN.2015.070019