1,242
Views
2
CrossRef citations to date
0
Altmetric
EDITORIAL

Innovative security technologies against insider threats and data leakage

, , &

References

  • N. Guo, T. Gao, and J. Wang, Privacy-preserving and efficient attributes proof based on selective aggregate CL-signature scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • J.L. Hernández-Ramos, A.J. Jara, L. Marín, and A.F. Skarmeta Gomez, DCapBAC: Embedding authorization logic into smart things through ECC optimizations, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • H. Kim, Y. Choi, D. Choi, and J. Ha, A secure exponentiation algorithm resistant to a combined attack on RSA implementation, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • H.-T. Lee, D. Kim, M. Park, and S.-j. Cho, Protecting data on android platform against privilege escalation attack, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • Z. Liu, D. Luo, J. Li, X. Chen, and C. Jia, N-Mobishare: New privacy-preserving location sharing system for mobile online social networks, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • J. Seo, S. Choi, M. Kim, and S. Han, A robust ensemble-based trust and reputation system against different types of intruder attacks, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • K. Singh, C. Pandu Rangan, and A.K. Banerjee, Lattice-based identity-based resplittable threshold public key encryption scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • C. Sur, Y. Park, and K.H. Rhee, An efficient and secure navigation protocol based on vehicular cloud, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • K.L. Tsai, F.-Y. Leu, and J.-S. Tan, An ECC-based secure EMR transmission system with data leakage prevention scheme, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.
  • F. Zhou, Y. Li, Q. Zhou, J. Miao, and J. Xu, The electronic cash system based on non-interactive zero-knowledge proofs, Int. J. Comput. Math. 92(X) (2015), pp. aa–bb.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.