Temporal dynamics in social trust prediction Guoyong CaiRui LvHuan Liu Security of Information System 11 September 2014 Pages: 369 - 378
A trusted mobile payment environment based on trusted computing and virtualization technology Juan WangWutao LinJiang Wang Security of Information System 11 September 2014 Pages: 379 - 384
Semantic description and verification of security policy based on ontology Chenghua TangLina WangJilong Tian Security of Information System 11 September 2014 Pages: 385 - 392
cMonitor: VMI-based fine-grained monitoring mechanism in cloud Hao ZhangLei ZhaoLina Wang Security of Information System 11 September 2014 Pages: 393 - 397
A novel risk assessment model for privacy security in Internet of Things Tianshui WuGang Zhao Security of Information System 11 September 2014 Pages: 398 - 404
Software defect prediction using fuzzy integral fusion based on GA-FM Kewen LiChenxi ChenQinghua Lu Security of Information System 11 September 2014 Pages: 405 - 408
Network security situation evaluation based on modified D-S evidence theory Chundong WangYu Zhang Security of Network 11 September 2014 Pages: 409 - 416
Deepflow: Hiding anonymous communication traffic in P2P streaming networks Jianming LvChaoyun ZhuCan Yang Security of Network 11 September 2014 Pages: 417 - 425
Multi-party identity-based symmetric privacy-preserving matching with cloud storage Shuo QiuJiqiang LiuZhen Han Cryptology 11 September 2014 Pages: 426 - 432
New multivariate-based certificateless hybrid signcryption scheme for multi-recipient Yiliang HanZelun YueXiaoyuan Yang Cryptology 11 September 2014 Pages: 433 - 440
Construction vectors for visual cryptographic schemes Ruchun Fei Cryptology 11 September 2014 Pages: 441 - 448
Key management for outsourced data security Bei PeiChangsong ChenChangsheng Wan Cryptology 11 September 2014 Pages: 449 - 454
An efficient identity-based key agreement protocol in a multiple PKG environment Huan ZhouXiaofeng WangJinshu Su Cryptology 11 September 2014 Pages: 455 - 460