JISE
Journal of Information Science and Engineering
Vol. 33 No. 4 (July 2017)
SPECIAL ISSUE ON EMERGING INFORMATION SECURITY AND PRIVACY TRENDS FOR SMART CITY
PAPERS
1. Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability
FENG WANG,LI XU........ pp. 873-889
2. Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data
KE HUANG,XIAO-SONG ZHANG,XIAO-FEN WANG........ pp. 891-905
3. A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing
FU-SHAN WEI,QI JIANG,RUI-JIE ZHAN,CHUAN-GUI MA........ pp. 907-921
4. An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City
JIAN SHEN,DENGZHI LIU,QI LIU,DEBIAO HE,XINGMING SUN........ pp. 923-938
5. Optimizing LWE-based FHE for Better Security and Privacy Protection of Smart City
WEI-TAO SONG,BIN HU,XIU-FENG ZHAO........ pp. 939-952
6. Efficient Encrypted Data Comparison Through a Hybrid Method
XING-XIN LI,YOU-WEN ZHU,JIAN WANG........ pp. 953-964
7. Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services
JIAN XU,SI-JIA ZHAO,FU-CAI ZHOU........ pp. 965-978
8. Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks
FAN ZHANG,LIN KANG,XINYAN XU,JIAN SHEN,LU ZHOU........ pp. 979-992
9. Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security
MINGWU ZHANG,YUDI ZHANG,HUA SHEN,CHUNMING TANG,LEIN HARN........ pp. 993-1006
10. An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy
JINGJING GUO,JIANFENG MA,XINGHUA LI,JUNWEI ZHANG,TAO ZHANG........ pp. 1007-1023
11. A Privacy-Preserving V2I Authentication Scheme Without Certificates
HAO-HAO NIE,YAN-PING LI,QIAN-HONG WU........ pp. 1025-1040
12. Impossible Differential Analysis on Round-Reduced PRINCE
YAO-LING DING,JING-YUAN ZHAO,LEI-BO LI,HONG-BO YU........ pp. 1041-1053
SHORT PAPERS
13. Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding
QIAO LIU,YONG WANG,WENJING ZHANG,HUI LI........ pp. 1055-1067
14. Bayesian Networks for Intrusion Dependency Analysis in Water Controlling Systems
FEIFEI SUN,CHAO WU,DONG SHENG........ pp. 1069-1083
15. Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices
YANG LI,MENTING CHEN,JIAN WANG........ pp. 1085-1100