The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 06 - Nov.-Dec. (vol. 14)
ISSN: 1545-5971

Editor's Note (HTML)

pp. 577

Achieving Content-Oriented Anonymity with CRISP (Abstract)

Peng Zhang , Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an, China
Qi Li , Graduate School at Shenzhen, Tsinghua University, Shenzhen, China
Patrick P. C. Lee , Department of Computer Science and Engineering, Chinese University of Hong Kong, Hong Kong
pp. 578-590

Enhancing MongoDB with Purpose-Based Access Control (Abstract)

Pietro Colombo , Dipartimento di Scienze Teoriche e Applicate UniversitÓ degli Studi dell?Insubria, Varese, Italy
Elena Ferrari , Dipartimento di Scienze Teoriche e Applicate UniversitÓ degli Studi dell?Insubria, Varese, Italy
pp. 591-604

Fast Software Implementations of Bilinear Pairings (Abstract)

Reza Azarderakhsh , Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY
Dieter Fishbein , Center for Applied Cryptographic Research (CACR), Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada
Gurleen Grewal , Center for Applied Cryptographic Research (CACR), Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada
Shi Hu , Department of Computer Science, Cornell Univeristy, NY
David Jao , Center for Applied Cryptographic Research (CACR), Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario, Canada
Patrick Longa , Microsoft Research, One Microsoft Way, Redmond, WA
Rajeev Verma , Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY
pp. 605-619

Forensic Identification of Anonymous Sources in OneSwarm (Abstract)

George Bissias , College of Information and Computer Sciences, University of Massachusetts, Amherst
Brian Neil Levine , College of Information and Computer Sciences, University of Massachusetts, Amherst
Marc Liberatore , College of Information and Computer Sciences, University of Massachusetts, Amherst
Swagatika Prusty , College of Information and Computer Sciences, University of Massachusetts, Amherst
pp. 620-632

Incentivized Outsourced Computation Resistant to Malicious Contractors (Abstract)

Alptekin Kupcu , Department of Computer Science and Engineering, Koç University, Turkey
pp. 633-649

Learning-Based Jamming Attack against Low-Duty-Cycle Networks (Abstract)

Zequ Yang , State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China
Peng Cheng , State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China
Jiming Chen , State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China
pp. 650-663

StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring (Abstract)

Marco Bonola , Research unit Tor Vergata, CNIT/University of Rome Tor Vergata, Roma, Italy
Giuseppe Bianchi , Electronic Engineering, University Roma Tor Vergata, Roma, Italy
Giulio Picierro , DISP, University Roma Tor Vergata, Roma, Italy
Salvatore Pontarelli , Research unit Tor Vergata, CNIT/University of Rome Tor Vergata, Roma, Italy
Marco Monaci , Electronic Engineering, University Roma Tor Vergata, Roma, Italy
pp. 664-678

Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing (Abstract)

Hui Ma , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Rui Zhang , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Zhiguo Wan , School of Computer Science and Technology, Shandong University, Jinan, Shandong, China
Yao Lu , Department of Complexity Science and Engineering, the University of Tokyo, Japan
Suqing Lin , State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
pp. 679-692

Cryptanalysis of a Privacy-Preserving Aggregation Protocol (Abstract)

Marc Joye , R&I, Technicolor, Los Altos, CA
pp. 693-694

2017 Reviewers List* (PDF)

pp. 695-698
88 ms
(Ver 3.3 (11022016))