References
- N. Guo, T. Gao, and J. Wang, Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- J.L. Hernández-Ramos, A.J. Jara, L. Marín, and A.F. Skarmeta Gomez, DCapBAC: Embedding authorization logic into smart things through ECC optimizations, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- H. Kim, Y. Choi, D. Choi, and J. Ha, A secure exponentiation algorithm resistant to a combined attack on RSA implementation, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- H.-T. Lee, D. Kim, M. Park, and S.-j. Cho, Protecting data on android platform against privilege escalation attack, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- Z. Liu, D. Luo, J. Li, X. Chen, and C. Jia, N-Mobishare: New privacy-preserving location sharing system for mobile online social networks, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- J. Seo, S. Choi, M. Kim, and S. Han, A robust ensemble-based trust and reputation system against different types of intruder attacks, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- K. Singh, C. Pandu Rangan, and A.K. Banerjee, Lattice-based identity-based resplittable threshold public key encryption scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- C. Sur, Y. Park, and K.H. Rhee, An efficient and secure navigation protocol based on vehicular cloud, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- K.L. Tsai, F.-Y. Leu, and J.-S. Tan, An ECC-based secure EMR transmission system with data leakage prevention scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
- F. Zhou, Y. Li, Q. Zhou, J. Miao, and J. Xu, The electronic cash system based on non-interactive zero-knowledge proofs, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.