Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2642)
Editorial
(400)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
31
32
33
34
35
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Editorial
Managing Editor's Column
Christian Gütl
10.3217/jucs-025-04
28-04-2019
Unique: 611 | Total: 1051
| Access Period:
309-309
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 744 | Total: 1351
| Access Period:
294-308
HTML
XML
PDF
Research Article
An Identity-Based Signcryption on Lattice without Trapdoor
Xianmin Wang
,
Yu Zhang
,
Brij Gupta
,
Hongfei Zhu
,
Dongxi Liu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0282
28-03-2019
Unique: 765 | Total: 1339
| Access Period:
282-293
HTML
XML
PDF
Research Article
Combination Model of Heterogeneous Data for Security Measurement
Xiuze Dong
,
Yunchuan Guo
,
Fenghua Li
,
Liju Dong
,
Arshad Khan
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0270
28-03-2019
Unique: 697 | Total: 1254
| Access Period:
270-281
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 799 | Total: 1460
| Access Period:
245-269
HTML
XML
PDF
Research Article
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
Yunling Wang
,
Jianfeng Wang
,
Shi-Feng Sun
,
Joseph Liu
,
Willy Susilo
,
Joonsang Baek
,
Ilsun You
,
Xiaofeng Chen
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0222
28-03-2019
Unique: 849 | Total: 1419
| Access Period:
222-244
HTML
XML
PDF
Research Article
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
Xiaoling Tao
,
Liyan Liu
,
Feng Zhao
,
Yan Huang
,
Saide Zhu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0203
28-03-2019
Unique: 775 | Total: 1398
| Access Period:
203-221
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 688 | Total: 1238
| Access Period:
182-202
HTML
XML
PDF
Research Article
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0158
28-03-2019
Unique: 678 | Total: 1247
| Access Period:
158-181
HTML
XML
PDF
Editorial
Advances of Provable Security Techniques
Yong Yu
,
Yi Mu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03
28-03-2019
Unique: 658 | Total: 1161
| Access Period:
154-157
HTML
XML
PDF
Research Article
Designing a Human Computation Framework to Enhance Citizen-Government Interaction
Koldo Zabaleta
,
Unai Lopez-Novoa
,
Ivan Pretel
,
Diego López-De-Ipiña
,
Vincenzo Cartelli
,
Giuseppe Modica
,
Orazio Tomarchio
10.3217/jucs-025-02-0122
28-02-2019
Unique: 696 | Total: 1265
| Access Period:
122-153
HTML
XML
PDF
Research Article
Sorting Permutations by λ-Operations
Guilherme Henrique Santos Miranda
,
Carla Lintzmayer
,
Zanoni Dias
10.3217/jucs-025-02-0098
28-02-2019
Unique: 672 | Total: 1228
| Access Period:
98-121
HTML
XML
PDF
31
32
33
34
35
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK