18 December 2014

Special issue published: "Innovative Mobile and Internet Technologies"

International Journal of Internet Protocol Technology 8(2/3) 2014

Expanded versions of papers presented at the 7th International Conference on Frontier of Computer Science and Technology (FCST 2012).
  • A data flow-oriented specification method for analysing network security configurations
  • Intrusion detection method based on nonlinear correlation measure
  • An efficient quantum anonymous communication with hybrid entanglement swapping
  • Efficient constructions of certificate-based key encapsulation mechanism
  • Efficient identity-based threshold signature scheme from bilinear pairings in standard model
  • High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes
  • LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing
  • Modelling, analysis and containment of passive worms in P2P networks
  • Quantum states sharing in the relay system with teleportation of non-maximally entanglement
  • The algorithm model for cumulative vulnerability risk assessment

No comments: