The Computer Journal, Volume 61 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

- > Home > Journals > The Computer Journal
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 61, Number 1, January 2018
Section A: Computer Science Theory, Methods and Tools
Original Articles

Xinju Zhang:
Multi-state System Reliability Analysis Based on Fuzzy Colored Petri Nets. 1-13

Chin-Chia Wu
, Shang-Chia Liu, Chuanli Zhao, Sheng-Zhi Wang, Win-Chin Lin:
A Multi-Machine Order Scheduling with Learning Using the Genetic Algorithm and Particle Swarm Optimization. 14-31

Jurairat Phuttharak, Seng W. Loke:
LogicCrowd: Crowd-Powered Logic Programming Based Mobile Applications. 32-46

Ji-Bo Wang, Lin Li:
Machine Scheduling with Deteriorating Jobs and Modifying Maintenance Activities. 47-53

Hon-Chan Chen, Tzu-Liang Kung, Lih-Hsing Hsu:
An Augmented Pancyclicity Problem of Crossed Cubes. 54-62

Nidhi Kalra, Ajay Kumar
:
Deterministic Deep Pushdown Transducer and its Parallel Version. 63-73

Juan Carlos Saez
, Adrian Pousa
, Armando De Giusti, Manuel Prieto
:
On the Interplay Between Throughput, Fairness and Energy Efficiency on Asymmetric Multicore Processors. 74-94

Nisha Chaurasia
, Shashikala Tapaswi, Joydip Dhar
:
A Resource Efficient Expectation Maximization Clustering Approach for Cloud. 95-104

Zhenyou Wang, Cuntao Xiao, Xianwei Lin, Yuan-Yuan Lu:
Single Machine Total Absolute Differences Penalties Minimization Scheduling with a Deteriorating and Resource-Dependent Maintenance Activity. 105-110

Wojciech Mula, Nathan Kurz, Daniel Lemire:
Faster Population Counts Using AVX2 Instructions. 111-120

Jou-Ming Chang
, Jinn-Shyong Yang, Shyue-Ming Tang, Kung-Jui Pai:
The Wide Diameters of Regular Hyper-Stars and Folded Hyper-Stars. 121-128

Xiaoyan Li
, Jianxi Fan, Cheng-Kuan Lin, Xiaohua Jia:
Diagnosability Evaluation of the Data Center Network DCell. 129-143

Xiaodong Meng, Minyi Guo, Jingyu Zhang
:
An Efficient Graph Query Framework with Structural Recursion. 144-157

Jianbin Huang, Xiaojing Sun, Yu Zhou, Heli Sun
:
Corrigendum: A Team Formation Model with Personnel Work Hours and Project Workload Quantified. 158
Volume 61, Number 2, February 2018
Section B: Computer and Communications Networks and Systems
Original Articles

Saurabh K. Pandey
, Mukesh A. Zaveri:
Quasi Random Deployment and Localization in Layered Framework for the Internet of Things. 159-179

Xiaolin Chang, Tianju Wang, Ricardo J. Rodríguez, Zhenjiang Zhang:
Modeling and Analysis of High Availability Techniques in a Virtualized System. 180-198

Natarajan Meghanathan
:
Complex Network Analysis-Based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks. 199-222

I Karthiga, Sharmila Sankar
:
Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN. 223-232

Tahani Hussain, Paulvanna Nayaki Marimuthu, Sami J. Habib:
Exploration of Storage Architectures for Enterprise Network. 233-247

Subramaniam Sarathambekai, Kandaswamy Umamaheswari:
Multi-Objective Optimization Techniques for Task Scheduling Problem in Distributed Systems. 248-263

Bang Chul Jung
, Jae Sook Yoo, Woongsup Lee
:
A Practical Physical-Layer Network Coding with Spatial Modulation in Two-Way Relay Networks. 264-272

Jigang Wu, Long Chen
, Xu Wang, Guiyuan Jiang, Siew-Kei Lam, Thambipillai Srikanthan:
Algorithms for Replica Placement and Update in Tree Network. 273-287

Lin Lyu
, Shengli Liu, Shuai Han:
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security. 288-318
Volume 61, Number 3, March 2018

Mona Taghavi, Jamal Bentahar
, Kaveh Bakhtiyari
, Chihab Hanachi:
New Insights Towards Developing Recommender Systems. 319-348

Iqbal H. Sarker
, Alan Colman
, Muhammad Ashad Kabir
, Jun Han:
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior. 349-368

Prashant K. Srivastava
, Ashish Khare
:
Content-Based Image Retrieval using Local Binary Curvelet Co-occurrence Pattern - A Multiresolution Technique. 369-385

Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally:
Structural analysis and classification of search interfaces for the deep web. 386-398

Jeremy Barnett, Philip C. Treleaven:
Algorithmic Dispute Resolution - The Automation of Professional Dispute Resolution Using AI and Blockchain Technologies. 399-408

Zhou Shao, Muhammad Aamir Cheema, David Taniar
:
Trip Planning Queries in Indoor Venues. 409-426

Chitra M. Subramanian, Aneesh Krishna
, Arshinder Kaur
:
Game Theory-Based Requirements Analysis in the i* Framework. 427-446

Meng-Jia Zhang, Kang Zhang, Jie Li, Yi-Na Li
:
Visual Exploration of 3D Geospatial Networks in a Virtual Reality Environment. 447-458

Hazem Hiary
, Rawan Zaghloul
, Moh'd Belal Al-Zoubi
:
Single-Image Shadow Detection using Quaternion Cues. 459-468
Volume 61, Number 4, April 2018
Section D: Security in Computer Systems and Networks
Original Articles

Jianhong Zhang
, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. 469-471

Emma Osborn
, Andrew Simpson
:
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study. 472-495

Haiqin Wu
, Liangmin Wang
, Shunrong Jiang:
Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments. 496-511

Tran Viet Xuan Phuong, Guomin Yang
, Willy Susilo
:
Criteria-Based Encryption. 512-525

Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. 526-538

Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. 539-544

Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo
, Xiaolei Dong:
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols. 545-560

Husen Wang, Qiang Tang
:
Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE. 575-585

Yanwei Zhou
, Bo Yang, Yi Mu:
Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles. 586-600

Kamalkumar R. Macwan
, Sankita J. Patel:
k-NMF Anonymization in Social Network Data Publishing. 601-613

Kaushal A. Shah
, Devesh C. Jinwala
:
Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks. 614-628
Volume 61, Number 5, May 2018
Section A: Computer Science Theory, Methods and Tools
Original Articles

Shuanglong Kan, Zhiqiu Huang:
Partial Order Reduction for the full Class of State/Event Linear Temporal Logic. 629-644

Lalit Mohan Goyal
, M. M. Sufyan Beg
, Tanvir Ahmad
:
An Efficient Framework for Mining Association Rules in the Distributed Databases. 645-657

Liangze Yin, Wei Dong, Fei He, Ji Wang:
A True-Concurrency Encoding for BMC of Compositional Systems. 658-671

Mei-Mei Gu
, Rong-Xia Hao
, Yan-Quan Feng
, Ai-Mei Yu:
The 3-extra Connectivity and Faulty Diagnosability. 672-686

Edans Flavius de Oliveira Sandes, George Luiz Medeiros Teodoro, Maria Emília M. T. Walter
, Xavier Martorell, Eduard Ayguadé, Alba Cristina Magalhaes Alves de Melo
:
Formalization of Block Pruning: Reducing the Number of Cells Computed in Exact Biological Sequence Comparison Algorithms. 687-713

Liqiong Xu, Shuming Zhou, Guanqin Lian, Zuwen Luo:
A Kind of Conditional Connectivity of Cayley Graphs Generated by 2-trees. 714-721

Mosong Zhou
, Xiaoshe Dong
, Heng Chen, Xingjun Zhang:
A Runtime Available Resource Capacity Evaluation Model Based on the Concept of Similar Tasks. 722-744

Yi Qi, Huan Li, Zhongzhi Zhang
:
Extended Corona Product as an Exactly Tractable Model for Weighted Heterogeneous Networks. 745-760

Shiying Wang, Guozhen Zhang, Kai Feng:
Edge Fault Tolerance of Cartesian Product Graphs on Super Restricted Edge Connectivity. 761-772

Andrea Farruggia, Travis Gagie
, Gonzalo Navarro, Simon J. Puglisi
, Jouni Sirén:
Relative Suffix Trees. 773-788
Volume 61, Number 6, June 2018
Section B: Computer and Communications Networks and Systems
Original Articles

Feng Dan, Yajie Ma, Fengxing Zhou, Xiaomao Wang, Kai He:
A Safety Message Broadcast Strategy in Hybrid Vehicular Network Environment. 789-797

Tua Agustinus Tamba
:
On Handelman's Representation of Network Utility Maximization. 798-807

Giuseppe Lettieri
, Vincenzo Maffione, Luigi Rizzo:
A Study of I/O Performance of Virtual Machines. 808-831

Atul Tripathi, Isha Pathak, Deo Prakash Vidyarthi:
Energy Efficient VM Placement for Effective Resource Utilization using Modified Binary PSO. 832-846

Jyotshana Kanti, Geetam Singh Tomar
:
Solution of sensing failure problem: an improved two-stage detector. 847-855

Roberto Rodríguez-Rodríguez, Javier Díaz, Fernando Castro
, Pablo Ibáñez
, Daniel Chaver
, Víctor Viñals, Juan Carlos Saez
, Manuel Prieto-Matías
, Luis Piñuel, Teresa Monreal Arnal
, José María Llabería
:
Reuse Detector: Improving the Management of STT-RAM SLLCs. 856-880

Nileshkumar R. Patel
, Shishir Kumar:
Energy-Efficient Approach for Effective Estimation of Delimited Node Position with Limited References. 881-895

Ping Xie
, Jianzhong Huang, Xiao Qin
, Changsheng Xie:
SmartRec: Fast Recovery from Single Failures in Heterogeneous RAID-Coded Storage Systems. 896-911

Francisco José Esteban
, David Díaz, Pilar Hernández, Juan Antonio Caballero, Gabriel Dorado, Sergio Gálvez
:
MC64-Cluster: Many-Core CPU Cluster Architecture and Performance Analysis in B-Tree Searches. 912-925

Thompson Stephan, K. Suresh Joseph:
Particle Swarm Optimization-Based Energy Efficient Channel Assignment Technique for Clustered Cognitive Radio Sensor Networks. 926-936

Tong Liu, Yanmin Zhu, Ting Wen, Jiadi Yu:
Location Privacy-Preserving Method for Auction-Based Incentive Mechanisms in Mobile Crowd Sensing. 937-948
Volume 61, Number 7, July 2018
Section C: Computational Intelligence, Machine Learning and Data Analytics
Special Issue on Socially Aware Networking

Chao Tong, Xiang Yin, Jun Li
, Tongyu Zhu, Renli Lv, Liang Sun, Joel J. P. C. Rodrigues:
A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. 949-958

Jieren Cheng, Jinghe Zhou
, Qiang Liu
, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. 959-970

Noor Ullah
, Xiangjie Kong
, Liangtian Wan, Honglong Chen, Zhibo Wang
, Feng Xia
:
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. 971-986

Jiaqi Wang, Yunyao Lu, Xiaojie Wang
, Jing Dong, Xiping Hu
:
SAR: A Social-Aware Route Recommendation System for Intelligent Transportation. 987-997

Mostafa Haghir Chehreghani
, Albert Bifet
, Talel Abdessalem:
Discriminative Distance-Based Network Indices with Application to Link Prediction. 998-1014
Original Articles

Xiaogang Fu, Jianyong Sun
:
Reference-Inspired Many-Objective Evolutionary Algorithm Based on Decomposition. 1015-1037

Alexey Stakhov:
Mission-Critical Systems, Paradox of Hamming Code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases. 1038-1063

Yonghong Hou, Lin Xue, Shuo Li
, Jiaming Xing:
User-Experience-Oriented Fuzzy Logic Controller for Adaptive Streaming. 1064-1074

Wassim Derguech
, Sami Bhiri, Edward Curry:
Using Ontologies for Business Capability modelling: Describing What Services and Processes Achieve. 1075-1098

C. Harriet Linda
, G. Wiselin Jiji:
Hierarchical Approach to Detect Fractures in CT DICOM Images. 1099-1108
Volume 61, Number 8, August 2018
Section D: Security in Computer Systems and Networks
Original Articles

Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. 1109-1122

Rong Wang
, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. 1123-1132

Haijiang Wang
, Xiaolei Dong, Zhenfu Cao
, Dongmei Li:
Secure and Efficient Attribute-Based Encryption with Keyword Search. 1133-1142

Gunikhan Sonowal
, K. S. Kuppusamy:
SmiDCA: An Anti-Smishing Model with Machine Learning Approach. 1143-1157

Rongjia Li, Chenhui Jin:
Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128. 1158-1165

Xiaojuan Zhang, Xiutao Feng, Dongdai Lin:
Fault Attack on ACORN v3. 1166-1179

Amir Daneshgar
, Fahimeh Mohebbipoor:
A Secure Self-Synchronized Stream Cipher. 1180-1201

Baoguo Yuan, Junfeng Wang
, Zhiyang Fang, Li Qi:
A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection. 1202-1215

Jianye Huang, Qiong Huang, Willy Susilo
:
Leakage-Resilient Dual-Form Signatures. 1216-1227

Dianyan Xiao, Yang Yu
:
Klepto for Ring-LWE Encryption. 1228-1239

Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang
, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. 1240-1251

Ya Liu
, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. 1252-1258

Baodong Qin, Qinglan Zhao, Dong Zheng:
Bounded Revocable and Outsourceable ABE for Secure Data Sharing. 1259-1268
Volume 61, Number 9, September 2018
Section A: Computer Science Theory, Methods and Tools
Original Articles

Beiyang Zhang
, Xiedong Zhang, Zhihua Zhang
:
Nested-Stacking Genetic Algorithm for the Optimal Placement of Sensors in Bridge. 1269-1283

Jialei Liu
, Shangguang Wang
, Ao Zhou, Xiang Xu, Sathish A. P. Kumar, Fangchun Yang:
Towards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud. 1284-1295

Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:
Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. 1296-1305

Walayat Hussain
, Farookh Khadeer Hussain, Omar Hussain
, Ravindra Bagia, Elizabeth Chang
:
Risk-based framework for SLA violation abatement from the cloud service provider's perspective. 1306-1322

Ji-Bo Wang, Xin-Na Geng, Lu Liu, Jian-Jun Wang
, Yuan-Yuan Lu:
Single Machine CON/SLK Due Date Assignment Scheduling with Controllable Processing Time and Job-dependent Learning Effects. 1329-1337

Shufeng Kong
, Sanjiang Li
, Michael Sioutis
:
Exploring Directional Path-Consistency for Solving Constraint Networks. 1338-1350

Simone Faro
, Arianna Pavone
:
An Efficient Skip-Search Approach to Swap Matching. 1351-1360

Nurul Liyana Mohamad Zulkufli
, Sherzod Turaev
, Mohd Izzuddin Bin Mohd Tamrin
, Azeddine Messikh
:
Watson-Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm. 1361-1373

Andrea Pinna
, Roberto Tonelli, Matteo Orrù, Michele Marchesi:
A Petri Nets Model for Blockchain Analysis. 1374-1388

Samuel Tweneboah-Koduah, William J. Buchanan
:
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. 1389-1406

Pedro Álvarez
, Sergio Hernández, Javier Fabra, Joaquín Ezpeleta:
Cost-driven provisioning and execution of a computing-intensive service on the Amazon EC2. 1407-1421

Ji-Bo Wang, Lu Liu, Jian-Jun Wang
, Lin Li:
Makespan minimization scheduling with ready times, group technology and shortening job processing times. 1422-1428
Volume 61, Number 10, October 2018
Section B: Computer and Communications Networks and Systems
Original Articles

Leonildo José de Melo de Azevedo, Júlio Cezar Estrella, Luis Hideo Vasconcelos Nakamura
, Marcos José Santana, Regina H. C. Santana, Claudio Fabiano Motta Toledo, Bruno G. Batista, Stephan Reiff-Marganiec
:
Optimized Service Level Agreement Establishment in Cloud Computing. 1429-1442

Zhenni Feng, Yanmin Zhu, Hui Cai, Pingyi Luo:
Optimal Distributed Auction for Mobile Crowd Sensing. 1443-1459

Yunus Ozen
, Cüneyt Bayilmis
:
urgMAC: A New Traffic and QoS-aware Cross-Layer MAC protocol for Wireless Multimedia Sensor Networks. 1460-1467

Soumya Das
, Tamaghna Acharya
:
Faulty Node Detection in HMM-Based Cooperative Spectrum Sensing For Cognitive Radio Networks. 1468-1478

Reza Entezari-Maleki
, Kishor S. Trivedi, Leonel Sousa, Ali Movaghar:
Performability-Based Workflow Scheduling in Grids. 1479-1495

Maroua Meddeb, Amine Dhraief
, Abdelfettah Belghith
, Thierry Monteil, Khalil Drira, Saad Al-Ahmadi
:
Cache Freshness in Named Data Networking for the Internet of Things. 1496-1511

Margarida Mamede
, José Legatheaux Martins, João Horta:
BOUQUET - Aggregating Network Paths in Trees to Reduce Data-Plane Forwarding State. 1512-1522

Gobalakrishnan Natesan
, C. Arun:
A New Multi-Objective Optimal Programming Model for Task Scheduling using Genetic Gray Wolf Optimization in Cloud Computing. 1523-1536

Frédéric Giroire, Nicolas Huin
, Joanna Moulierac
, Truong Khoa Phan:
Energy-Aware Routing in Software-Defined Network using Compression. 1537-1556

Anubis Graciela de Moraes Rossetto
, Cláudio F. R. Geyer, Luciana Arantes, Pierre Sens:
Impact FD: An Unreliable Failure Detector Based on Process Relevance and Confidence in the System. 1557-1576

S. Renuga, S. S. K. Jagatheeshwari:
Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm. 1577-1588
Volume 61, Number 11, November 2018
Section C: Computational Intelligence, Machine Learning and Data Analytics
Original Articles

Himangshu Sarma
, Robert Porzel, Jan D. Smeddinck, Rainer Malaka
, Arun B. Samaddar:
A Text to Animation System for Physical Exercises. 1589-1604

Qirong Mao, Feifei Zhang, Liangjun Wang, Sidian Luo, Ming Dong:
Cascaded Multi-level Transformed Dirichlet Process for Multi-pose Facial Expression Recognition. 1605-1619

Ammar Sohail, Muhammad Aamir Cheema, David Taniar:
Social-Aware Spatial Top-k and Skyline Queries. 1620-1638

Md. Mosaddek Khan, Long Tran-Thanh, Sarvapali D. Ramchurn, Nicholas R. Jennings
:
Speeding Up GDL-Based Message Passing Algorithms for Large-Scale DCOPs. 1639-1666

Sunny Rai
, Shampa Chakraverty, Devendra K. Tayal, Yash Kukreti:
A Study on Impact of Context on Metaphor Detection. 1667-1682

Chandra Prakash, Rajesh Kumar
, Namita Mittal
:
Optimized Clustering Techniques for Gait Profiling in Children with Cerebral Palsy for Rehabilitation. 1683-1694

Zhenjun Tang
, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. 1695-1709

Zhi-Fang Yang, Chih-Ting Kuo, Te-Hsi Kuo:
Authorization Identification by Watermarking in Log-polar Coordinate System. 1710-1723

Zhi-jie Liang
, Sheng-bin Liao, Bing-zhang Hu:
3D Convolutional Neural Networks for Dynamic Sign Language Recognition. 1724-1736

Hamid Hassanpour
, N. Nowrozian, Mohammad Mahdi AlyanNezhadi
, Najmeh Samadiani
:
Image Zooming Using a Multi-layer Neural Network. 1737-1748
Volume 61, Number 12, December 2018
Section D: Security in Computer Systems and Networks
Invited Paper
Original Articles

Eunsung Lee, Sang Woo Kim:
Non-interactive Conditional Proxy Re-Signature in the Standard Model. 1772-1782

Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia:
Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm. 1783-1790

Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu:
On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. 1791-1793

Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han:
Computational Robust Fuzzy Extractor. 1794-1805

Yi Dou, Henry C. B. Chan
, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. 1806-1824

Shuai Han, Shengli Liu, Lin Lyu
, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. 1825-1844

Biao Wang
, Xueqing Wang, Rui Xue, Xinyi Huang:
Matrix FHE and Its Application in Optimizing Bootstrapping. 1845-1861

Yung-Ting Chuang
, Yi-Fan Lee:
Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. 1862-1879

Jinhui Liu, Yong Yu
, Bo Yang, Jianwei Jia, Shijia Wang
, Houzhen Wang:
Structural Key Recovery of Simple Matrix Encryption Scheme Family. 1880-1896

Qingwen Guo
, Qiong Huang, Guomin Yang
:
Authorized Function Homomorphic Signature. 1897-1908

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






