default search action
Journal of Internet Services and Information Security, Volume 1
Volume 1, Number 1, May 2011
- Malek Ben Salem, Bu-Sung Lee, Jie Zhang:
Cloud Computing. 1-3 - Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism. 4-17 - Yu-Shuo Chang, Shih-Hao Hung:
Developing Collaborative Applications with Mobile Cloud - A Case Study of Speech Recognition. 18-36 - Shifeng Shang, Bo Wang, Jinlei Jiang, Yongwei Wu, Weimin Zheng:
An Intelligent Capacity Planning Model for Cloud Market. 37-45 - Zhi Luo, Junping Wang, Qiliang Zhu:
Self-aware Services of NGSDP: Using Bayesian Networks for Measuring Quality of Convergent Services. 46-58 - Keng Y. Yee, Yilun Chia, Flora S. Tsai, Wee Tiong Ang, Rajaraman Kanagasabai:
Cloud-based Semantic Service-Oriented Content Provisioning Architecture for Mobile Learning. 59-69 - Turgay Korkmaz, Suleyman Tek:
Analyzing Response Time of Batch Signing. 70-85 - William R. Claycomb, Dongwan Shin:
Extending Formal Analysis of Mobile Device Authentication. 86-102
Volume 1, Numbers 2/3, August 2011
- Xiaofeng Chen:
Provable Security. 1-3 - Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez:
VDC-Based Dynamic Code Analysis: Application to C Programs. 4-20 - Maciej Grzeskowiak:
Algorithm for Generating Primes for the Giuliani-Gong Public Key System. 21-31 - Hai Huang:
An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. 32-43 - Dexin Yang, Bo Yang:
A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving. 44-56 - Mario Larangeira, Keisuke Tanaka:
Programmability in the Generic Ring and Group Models. 57-73 - Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. 74-88 - Kristian Gjøsteen, George Petrides, Asgeir Steine:
A Novel Framework for Protocol Analysis. 89-106 - Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption. 107-124 - Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro:
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems. 125-139 - Sébastien Canard, Julien Devigne, Fabien Laguillaumie:
Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme. 140-160 - Sumit Kumar Pandey, Rana Barua:
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. 161-180
Volume 1, Number 4, November 2011
- Christian Damsgaard Jensen, Nicola Dragoni, Anirban Basu, Clara Mancini:
Frontiers in Trust Management. 1-4 - Yanbin Lu, Gene Tsudik:
Privacy-Preserving Cloud Database Querying. 5-25 - Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi:
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor. 26-46 - Marcello Paolo Scipioni, Marc Langheinrich:
Towards a New Privacy-Aware Location Sharing Platform. 47-59 - Tracy Ann Kosa, Khalil El-Khatib, Stephen Marsh:
Measuring Privacy. 60-73 - Manuel Mazzara, Antonio Marraffa, Luca Biselli, Luca Chiarabini:
The Polidoxa Shift: a New Approach to Social Networks. 74-88 - Johari Abdullah, Aad P. A. van Moorsel:
Uncertainty and Uncertainty Tolerance in Service Provisioning. 89-109 - Natasha Dwyer, Tom Clark, Piotr Cofta:
Reading Trust and Distrust in Shared Documents: Film Professionals Review Film Reviews. 110-119
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.