International Journal of High Performance Computing and Networking (IJHPCN)

International Journal of High Performance Computing and Networking

2016 Vol.9 No.5/6

Special Issue on Cryptography and its Applications

Guest Editors: Professor Deqing Zou, Professor Bo Zhao and Dr. Xiaojing Ma


Pages Title and author(s)
357-371Remote attestation approach by cross-layer security policy translation
Lingbo Jiang; Yuping Wang; Tiehua Wen; Jianfeng Tan
DOI: 10.1504/IJHPCN.2016.080408
372-381An e-commerce trust model based on expanded subjective logic
Junfeng Tian; Hongqiang Jiao; Baomin Wang; Chao Chen
DOI: 10.1504/IJHPCN.2016.080409
382-393Two image encryption methods with hiding effect based on moiré pattern
Qian Gao; Zhen Han; Yongzhong He; Daoshun Wang
DOI: 10.1504/IJHPCN.2016.080410
394-400On the k-error linear complexity of generalised cyclotomic sequences
Longfei Liu; Xiaoyuan Yang; Xiaoni Du; Bin Wei
DOI: 10.1504/IJHPCN.2016.080411
401-408Utility-based anonymisation for dataset with multiple sensitive attributes
Lixia Wang; Qing Zhu
DOI: 10.1504/IJHPCN.2016.080412
409-416An anonymity mechanism with reduced server-side cost in peer-to-peer networks
Hao Peng; Dandan Zhao; Jianmin Han; Jianfeng Lu
DOI: 10.1504/IJHPCN.2016.080413
417-422Efficient fully homomorphic encryption with circularly secure key switching process
Tanping Zhou; Xiaoyuan Yang; Wei Zhang; Liqiang Wu
DOI: 10.1504/IJHPCN.2016.080414
423-430A novel GPU resources management and scheduling system based on virtual machines
Linchen Yu; Hong Yao; Xiaofei Liao
DOI: 10.1504/IJHPCN.2016.080415
431-442Security risk analysis of IaaS based on the abstract state machine model
Xiang Shuang; Zhao Bo; Xiao Yu; An Yang
DOI: 10.1504/IJHPCN.2016.080416
443-450Deterministic attribute-based encryption
Yanfeng Shi; Jiqiang Liu; Zhen Han; Shuo Qiu
DOI: 10.1504/IJHPCN.2016.080417
451-461Application of game theory for dynamic access control in security systems
Yixuan Zhang; Jingsha He; Bin Zhao; Ruohong Liu
DOI: 10.1504/IJHPCN.2016.080418
462-469A dynamic active shield against shield rerouting attack
Ting Feng; Kenli Li; Yunchuan Qin; Siyang Yu
DOI: 10.1504/IJHPCN.2016.080419
470-479BeCFI: detecting hidden control flow with performance monitoring counters
HongWei Zhou; WenChang Shi; JinHui Yuan; FuLin Li
DOI: 10.1504/IJHPCN.2016.080420
480-488Research on generating good key sequence based on chaos
Jing-jing Wang; Jia-yong Chen; Xiao-yuan Yang
DOI: 10.1504/IJHPCN.2016.080421

Additional Paper

489-498Efficient key management for publish/subscribe system in cloud scenarios
Zongmin Cui; Guangyong Gao; Caixue Zhou; Jing Yu; Anyuan Deng; Changshou Deng
DOI: 10.1504/IJHPCN.2016.080422