International Journal of Information and Communication Technology (IJICT)

International Journal of Information and Communication Technology

2018 Vol.12 No.1/2

Special Issue on: Cloud Computing and Data Centers Security

Guest Editors: Prof. Fatos Xhafa and Prof. Jin Li

Pages Title and author(s)
1-15Quantum information exchange protocol associated with the quantum cloud
Xiaoqing Tan; Xiaoqian Zhang
DOI: 10.1504/IJICT.2018.089019
16-30A novel identity-based anonymous authentication scheme from multilinear maps
Zhengjun Jing; Guoping Jiang; Chunsheng Gu
DOI: 10.1504/IJICT.2018.089020
31-50An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
Zhang Qiuyu; Xing Pengfei; Huang Yibo; Dong Ruihong; Yang Zhongping
DOI: 10.1504/IJICT.2018.089021
51-73Intelligent phishing detection system using similarity matching algorithms
Ankur Mishra; B.B. Gupta
DOI: 10.1504/IJICT.2018.089022
74-97Effective and secure data storage in multi-cloud storage architectures
Syam Kumar Pasupuleti
DOI: 10.1504/IJICT.2018.089023
98-112Grey neural network prediction model based on fruit fly optimisation algorithm and its application
Yang Jing; Zeng Hui; Huang Jiangping
DOI: 10.1504/IJICT.2018.089025
113-130S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension
Jianhong Zhang; Xubing Zhao; Weina Zhen
DOI: 10.1504/IJICT.2018.089027
131-142Frequent failure monitoring and reporting in virtualisation environment using backing algorithm technique
S. Anthoniraj; S. Saraswathi
DOI: 10.1504/IJICT.2018.089028
143-161Performance overhead analysis of virtualisation on ARM
Xiaoli Gong; Zhaoyang Shao; Qi Du; Aimin Yu; Jin Zhang
DOI: 10.1504/IJICT.2018.089026
162-174A review: The effects of imperfect data on incremental decision tree
Hang Yang; Peng Li; Xiaobin Guo; Huajun Chen; Zhiqiang Lin
DOI: 10.1504/IJICT.2018.089029
175-185The design of strain sensitising of high-sensitivity SAW sensor based on FBG
Wei Zhang
DOI: 10.1504/IJICT.2018.089030

Additional papers

186-208Middleware-managed high availability for cloud applications
Ali Kanso; Abdelouahed Gherbi; Yves Lemieux
DOI: 10.1504/IJICT.2018.089031
209-228Mimir: a term-distributed retrieval system for secret documents
Guoqiang Gao; Ruixuan Li; Zhiyong Xu
DOI: 10.1504/IJICT.2018.089024