default search action
Fundamenta Informaticae, Volume 157
Volume 157, Numbers 1-2, 2018
- Fatos Xhafa, Zhenfu Cao:
Preface. v-viii
- Mingwu Zhang:
ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances. 1-27 - Jing Li, Licheng Wang, Xinxin Niu, Lize Gu, Zhiguo Qu:
Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others. 29-46 - Licheng Wang, Jing Li, Lize Gu, Jianhua Yan, Zhiguo Qu:
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems. 47-62 - Lifei Wei, Kai Zhang, Lei Zhang, Dongmei Huang:
A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks. 63-78 - Mahalakshmi Jeyabalu, Kuppusamy Krishnamoorthy:
Hybridization of ICBC and Genetic Algorithm for Optimizing Encryption Process in Cloud Computing Application Service. 79-109 - Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and Improvement for Certificateless Aggregate Signature. 111-123 - Yuechuan Wei, Yisheng Rong, Cunyang Fan:
Differential Fault Attacks on Lightweight Cipher LBlock. 125-139 - Huajun Zhang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Proof of Multicopy via Proof of File Position in Cloud. 141-151 - Miao Zhang, Chenyu Wang, Jiteng Wang, Si Tian, Yanwei Li:
A New Approach to Security Analysis of Smart Home Authentication Systems. 153-165 - Yuling Chen, Min Lei, Wei Ren, Yi Ren, Zhiguo Qu:
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring. 167-184 - Jindan Zhang, Baocang Wang:
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking. 185-199 - Fushan Wei, Ruijie Zhang, Chuangui Ma:
A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing. 201-220
Volume 157, Number 3, 2018
- Gösta Grahne, Adrian Onet:
Anatomy of the Chase. 221-270 - Guiwu Wei:
Picture Fuzzy Hamacher Aggregation Operators and their Application to Multiple Attribute Decision Making. 271-320
Volume 157, Number 4, 2018
- Ludwik Czaja, Wojciech Penczek, Holger Schlingloff, Hung Son Nguyen:
Preface. i-ii
- Jafar Akhundov, Peter Tröger, Matthias Werner:
Superposition Principle in Composable Hybrid Automata. 321-339 - Kamila Barylska, Evgeny Erofeev, Maciej Koutny, Lukasz Mikulski, Marcin Piatkowski:
Reversing Transitions in Bounded Petri Nets. 341-357 - Ludwik Czaja:
A Protocol of Mutual Exclusion for DSM Based on Vectors of Global Timestamps. 359-370 - Andrzej Jankowski, Andrzej Skowron, Piotr Wasilewski:
Rough Sets and Sorites Paradox. 371-384 - Linh Anh Nguyen:
Computing Bisimulation-Based Comparisons. 385-401 - Artur Niewiadomski, Piotr Switalski, Marcin Kowalczyk, Wojciech Penczek:
TripICS - a Web Service Composition System for Planning Trips and Travels. 403-425 - Elisabeth Pelz:
Full Axiomatisation of Timed Processes of Interval-Timed Petri Nets. 427-442 - Artur Rataj, Bozena Wozna-Szczesniak:
Extrapolation of an Optimal Policy using Statistical Probabilistic Model Checking. 443-461 - Roman R. Redziejowski:
Trying to Understand PEG. 463-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.