Concurrency and Computation: Practice and Experience

Cover image for Vol. 28 Issue 15

Edited By: Geoffrey C. Fox and David W. Walker

Impact Factor: 0.942

ISI Journal Citation Reports © Ranking: 2015: 59/106 (Computer Science Software Engineering); 59/105 (Computer Science Theory & Methods)

Online ISSN: 1532-0634

Associated Title(s): Journal of Software: Evolution and Process, Software Focus, Software Testing, Verification and Reliability, Software: Practice and Experience, Theory and Practice of Object Systems

Virtual Issue: NSS2012 Special Issue: Security of New Generation Computing Systems


NSS2012 Special Issue: Security of New Generation Computing Systems

NSS2012 Special Issue: Security of New Generation Computing Systems
Li Xu, Elisa Bertino and Yi Mu

Impossible Differential Cryptanalysis on Cipher E2
Yuechuan Wei, Xiaoyuan Yang and Chao Li

A blind modulation identification algorithm for STBC systems using multidimensional ICA
Minggang Luo, Liping Li, Guobing Qian and Jianqi Lu

Public-Key Encryption Scheme with Selective Opening Chosen-Ciphertext Security Based on the DDH Assumption
Shengli Liu, Fangguo Zhang and Kefei Chen

On the Linear Complexity of Generalized Cyclotomic Binary Sequences of Length 2pq
Zu-Ling Chang and Dandan Li

Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers
Ming Tang, Zhenlong Qiu, Weijie Li, Weijin Sun, Xiaobo Hu and Huanguo Zhang

Provably Secure Certificate-based Key-Insulated Signature Scheme
Jiguo Li, Haiting Du, Yichen Zhang, Tao Li and Yuexin Zhang

Efficient and Robust Identity-Based Handoff Authentication for EAP-Based Wireless Networks
Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li and Jiaxiang Quan

(Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack
Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang

Attacks via Record Multiplicity on Cancelable Biometrics Templates
Cai Li and Jiankun Hu

SEARCH

SEARCH BY CITATION