Issue 4/2018
Content (8 Articles)
Regular Contribution
Supervised machine learning using encrypted training data
Francisco-Javier González-Serrano, Adrián Amor-Martín, Jorge Casamayón-Antón
Regular Contribution
Improved yoking proof protocols for preserving anonymity
HyoungMin Ham, JongHyup Lee, JooSeok Song
Regular Contribution
When time meets test
Jean-Louis Lanet, Hélène Le Bouder, Mohammed Benattou, Axel Legay
Regular Contribution
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
Regular Contribution
A new strong security model for stateful authenticated group key exchange
Zheng Yang, Chao Liu, Wanping Liu, Daigu Zhang, Song Luo
Regular Contribution
A pairing-based cryptographic approach for data security in the cloud
Miguel Morales-Sandoval, Jose Luis Gonzalez-Compean, Arturo Diaz-Perez, Victor J. Sosa-Sosa
Regular Contribution
Flexible ciphertext-policy attribute-based encryption supporting AND-gate and threshold with short ciphertexts
Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo
Regular Contribution
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
Hongyong Jia, Yue Chen, Julong Lan, Kaixiang Huang, Jun Wang