A new proxy re-encryption scheme for protecting critical information systems Xu An WangJianfeng MaXiaoyuan Yang Original Research 19 March 2015 Pages: 699 - 711
Dependability assessment of critical systems Salvatore Distefano Original Research 01 April 2015 Pages: 713 - 720
CPTIAS: a new fast PKI authentication scheme based on certificate path trust index Gao ZhiweiHu YingxinLu Kai Original Research 09 May 2015 Pages: 721 - 731
Heuristic strategies for preference-based scheduling in virtual organizations of utility grids Victor ToporkovAnna ToporkovaPetr Potekhin Original Research 28 March 2015 Pages: 733 - 740
An access control model to minimize the data exchange in the information retrieval Mario SicuranzaAngelo EspositoMario Ciampi Original Research 01 April 2015 Pages: 741 - 752
Use of the Dempster–Shafer theory to detect account takeovers in mobile money transfer services Luigi CoppolinoSalvatore D’AntonioLuigi Romano Original Research 01 April 2015 Pages: 753 - 762
Improvement and applications of secure outsourcing of scientific computations Jianhua YuXueli WangWei Gao Original Research 22 April 2015 Pages: 763 - 772
Parallel and distributed computing for UAVs trajectory planning Domenico PascarellaSalvatore VenticinqueLuciano Blasi Original Research 10 May 2015 Pages: 773 - 782
Advanced services for critical infrastructures protection Rafał KozikMichał ChoraśErich Rome Original Research Open access 06 June 2015 Pages: 783 - 795
Big data quantum private comparison with the intelligent third party Xiaoqing TanXiaoqian ZhangJin Li Original Research 27 June 2015 Pages: 797 - 806
A brief survey on secure multi-party computing in the presence of rational parties Yilei WangTao LiQiuliang Xu Original Research 03 July 2015 Pages: 807 - 824
New biometrics-based authentication scheme for multi-server environment in critical systems Han ShenChongzhi GaoLibing Wu Original Research 16 July 2015 Pages: 825 - 834
A study on fast SIFT image mosaic algorithm based on compressed sensing and wavelet transform Xin XieYin XuHuandong Xiong Original Research 16 September 2015 Pages: 835 - 843
Minimized-expansion based lossless image authentication algorithm Xiangyang LiRong LiJiangao Luo Original Research 18 September 2015 Pages: 845 - 854