
Volume 19, Issue 5 (2014)
Research Articles
An Improved ID-Based Group Key Agreement Protocol
Kangwen Hu, Jingfeng Xue, Changzhen Hu, Rui Ma, and Zhiqiang Li
Worst-Input Mutation Approach to Web Services Vulnerability Testing Based on SOAP Messages
Jinfu Chen, Huanhuan Wang, Dave Towey, Chengying Mao, Rubing Huang, and Yongzhao Zhan
A Class of the Hamming Weight Hierarchy of Linear Codes with Dimension 5
Guoxiang Hu, Huanguo Zhang, Lijun Wang, and Zhe Dong
Privacy Quantification Model Based on the Bayes Conditional Risk in Location-Based Services
Xuejun Zhang, Xiaolin Gui, Feng Tian, Si Yu, and Jian An
Attribute-Based Encryption for Circuits on Lattices
Jian Zhao, Haiying Gao, and Junqi Zhang
Dynamic Measurement Protocol in Infrastructure as a Service
Shuang Xiang, Bo Zhao, An Yang, and Tao Wei
Targeted Fully Homomorphic Encryption Based on a Double Decryption Algorithm for Polynomials
Yatao Yang, Shuang Zhang, Junming Yang, Jia Li, and Zichen Li
An Efficient and Practical Public Key Cryptosystem with CCA-Security on Standard Model
Zhen Liu, Xiaoyuan Yang, Weidong Zhong, and Yiliang Han
Research and Practice of Dynamic Network Security Architecture for IaaS Platforms
Lin Chen, Xingshu Chen, Junfang Jiang, Xueyuan Yin, and Guolin Shao
Malicious Code Detection Model Based on Behavior Association
Lansheng Han, Mengxiao Qian, Xingbo Xu, Cai Fu, and Hamza Kwisaba
Characteristics of a Two-Class Polling System Model
Zhijun Yang and Hongwei Ding
SwiftArray: Accelerating Queries on Multidimensional Arrays
Yifeng Geng, Xiaomeng Huang, and Guangwen Yang
Microblogging Reposting Mechanism: An Information Adoption Perspective
Wei Yan and Jinghua Huang