![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Grid and Utility Computing, Volume 4
Volume 4, Number 1, 2013
- ByungRae Cha, JongWon Kim:
Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments. 1-9 - Yona Raekow, Christian Simmendinger
, Domenic Jenz, Piotr Grabowski:
On-demand software licence provisioning in grid and cloud computing. 10-20 - Cristian Lai
, Claude Moulin:
Semantic indexing modelling of resources within a distributed system. 21-39 - Jinfeng Yang, Rong Cheng, Wenming Liu, Yong Xiao, Fangguo Zhang
:
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365. 40-46 - Roman Kopetzky, Markus Günther, Natalia Kryvinska, Andreas Mladenow, Christine Strauss, Christian Stummer:
Strategic management of disruptive technologies: a practical framework in the context of voice services and of computing towards the cloud. 47-59 - Peng Xiao, Dongbo Liu, Xilong Qu:
Resource co-allocation framework based on hybrid gaming model in grid environments. 60-69 - Sergio Nesmachnow
, Santiago Iturriaga
:
Multiobjective grid scheduling using a domain decomposition based parallel micro evolutionary algorithm. 70-84 - Fei Yan, Xiaofeng Chen, Yinghui Zhang:
Efficient online/offline signcryption without key exposure. 85-93
Volume 4, Numbers 2/3, 2013
- Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu
:
Access control requirements for structured document in cloud computing. 95-102 - Zhonghong Sun:
Fairness in the presence of semi-rational parties in rational two-party secure computation. 103-109 - Alessandro Barenghi
, Gerardo Pelosi
, Federico Terraneo
:
Secure and efficient design of software block cipher implementations on microcontrollers. 110-118 - Wazir Zada Khan
, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem
:
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks. 119-127 - Yichun Liu:
Fairness analysis of e-commerce protocols based on strand spaces. 128-133 - Siwei Peng, Baojiang Cui, Ru Jia, Shurui Liang, Yiying Zhang:
A novel vulnerability detection method for ZigBee MAC layer. 134-143 - Xudong Zhu, Hui Li, Fenghua Li:
Privacy-preserving logistic regression outsourcing in cloud computing. 144-150 - Changji Wang, Wentao Li:
An efficient attribute-based signature scheme with claim-predicate mechanism. 151-159 - Xinfeng Ye, Bakh Khoussainov:
Fine-grained access control for cloud computing. 160-168 - Shamsul Kamal Ahmad Khalid
, Mustafa Mat Deris, Kamaruddin Malik Mohamad:
Anti-cropping digital image watermarking using Sudoku. 169-177 - Jinson Zhang, Mao Lin Huang
, Doan Hoang:
Visual analytics for intrusion detection in spam emails. 178-186 - Sujuan Li, Futai Zhang:
Leakage-resilient identity-based encryption scheme. 187-196 - Yuanyuan Zhang, Marine Minier:
How network coding system constrains packet pollution attacks in wireless sensor networks. 197-203 - Guangye Sui, Mohamed Mejri:
FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test. 204-211 - Jie Zhang, Futai Zhang:
Linear threshold verifiable secret sharing in bilinear groups. 212-218
Volume 4, Number 4, 2013
- Mikhail Nesterenko, Sébastien Tixeuil:
Ideal stabilisation. 219-230 - Timothy M. Lynar
, Simon
, Ric D. Herbert, William J. Chivers:
Reducing energy consumption in distributed computing through economic resource allocation. 231-241 - Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long:
Securing data services: a security architecture design for private storage cloud based on HDFS. 242-254 - Peng Xiao, Ning Han:
Improving user QoS by relaxing resource reservation policy in high-performance grid environments. 255-264 - Ronald Petrlic, Stephan Sekula, Christoph Sorge:
A privacy-friendly architecture for future cloud computing. 265-277 - Ray Carroll, Sasitharan Balasubramaniam
, Junichi Suzuki, Chonho Lee, William Donnelly, Dmitri Botvich:
Bio-inspired service management framework: green data-centres case study. 278-292
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.