
Volume 21, Issue 3 (2016)
Research Articles
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
Yu Wang, Dingbang Xu, and Fan Li
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
Jingjing Wang, Yiliang Han, and Xiaoyuan Yang
Private Proximity Detection for Convex Polygons
Bin Mu and Spiridon Bakiras
An Improved String-Searching Algorithm and Its Application in Component Security Testing
Jinfu Chen, Saihua Cai, Lili Zhu, Yuchi Guo, Rubing Huang, Xiaolei Zhao, and Yunqi Sheng
On the Linear Complexity of New Generalized Cyclotomic Binary Sequences of Order Two and Period pqr
Longfei Liu, Xiaoyuan Yang, Xiaoni Du, and Bin Wei
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem
Houzhen Wang, Huanguo Zhang, Shaowu Mao, Wanqing Wu, and Liqiang Zhang
TPM-Based Remote Attestation for Wireless Sensor Networks
Donglai Fu and Xinguang Peng
An Anomalous Behavior Detection Model in Cloud Computing
Xiaoming Ye, Xingshu Chen, Haizhou Wang, Xuemei Zeng, Guolin Shao, Xueyuan Yin, and Chun Xu
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
Qi Yuan, Chunguang Ma, Xiaorui Zhong, Gang Du, and Jiansheng Yao
Cryptanalysis of Public Key Cryptosystems Based on Non-Abelian Factorization Problems
Jinhui Liu, Aiwan Fan, Jianwei Jia, Huanguo Zhang, Houzhen Wang, and Shaowu Mao
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
Rui Ma, Daguang Wang, Changzhen Hu, Wendong Ji, and Jingfeng Xue