for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Oxford University Press   (Total: 392 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 392 Journals sorted alphabetically
Acta Biochimica et Biophysica Sinica     Hybrid Journal   (Followers: 5, SJR: 0.881, h-index: 38)
Adaptation     Hybrid Journal   (Followers: 8, SJR: 0.111, h-index: 4)
Advances in Nutrition     Hybrid Journal   (Followers: 42, SJR: 2.075, h-index: 36)
Aesthetic Surgery J.     Hybrid Journal   (Followers: 6, SJR: 1.538, h-index: 35)
African Affairs     Hybrid Journal   (Followers: 64, SJR: 1.512, h-index: 46)
Age and Ageing     Hybrid Journal   (Followers: 86, SJR: 1.611, h-index: 107)
Alcohol and Alcoholism     Hybrid Journal   (Followers: 18, SJR: 0.935, h-index: 80)
American Entomologist     Full-text available via subscription   (Followers: 6)
American Historical Review     Hybrid Journal   (Followers: 149, SJR: 0.652, h-index: 43)
American J. of Agricultural Economics     Hybrid Journal   (Followers: 40, SJR: 1.441, h-index: 77)
American J. of Clinical Nutrition     Hybrid Journal   (Followers: 145, SJR: 3.771, h-index: 262)
American J. of Epidemiology     Hybrid Journal   (Followers: 169, SJR: 3.047, h-index: 201)
American J. of Hypertension     Hybrid Journal   (Followers: 25, SJR: 1.397, h-index: 111)
American J. of Jurisprudence     Hybrid Journal   (Followers: 18)
American J. of Legal History     Full-text available via subscription   (Followers: 9, SJR: 0.151, h-index: 7)
American Law and Economics Review     Hybrid Journal   (Followers: 27, SJR: 0.824, h-index: 23)
American Literary History     Hybrid Journal   (Followers: 15, SJR: 0.185, h-index: 22)
Analysis     Hybrid Journal   (Followers: 21)
Animal Frontiers     Hybrid Journal  
Annals of Behavioral Medicine     Hybrid Journal   (Followers: 14, SJR: 2.112, h-index: 98)
Annals of Botany     Hybrid Journal   (Followers: 35, SJR: 1.912, h-index: 124)
Annals of Oncology     Hybrid Journal   (Followers: 47, SJR: 4.362, h-index: 173)
Annals of the Entomological Society of America     Full-text available via subscription   (Followers: 8, SJR: 0.642, h-index: 53)
Annals of Work Exposures and Health     Hybrid Journal   (Followers: 29, SJR: 0.837, h-index: 57)
AoB Plants     Open Access   (Followers: 4, SJR: 0.78, h-index: 10)
Applied Economic Perspectives and Policy     Hybrid Journal   (Followers: 16, SJR: 0.884, h-index: 31)
Applied Linguistics     Hybrid Journal   (Followers: 55, SJR: 1.749, h-index: 63)
Applied Mathematics Research eXpress     Hybrid Journal   (Followers: 1, SJR: 0.779, h-index: 11)
Arbitration Intl.     Full-text available via subscription   (Followers: 20)
Arbitration Law Reports and Review     Hybrid Journal   (Followers: 14)
Archives of Clinical Neuropsychology     Hybrid Journal   (Followers: 30, SJR: 0.96, h-index: 71)
Aristotelian Society Supplementary Volume     Hybrid Journal   (Followers: 3, SJR: 0.102, h-index: 20)
Arthropod Management Tests     Hybrid Journal   (Followers: 2)
Astronomy & Geophysics     Hybrid Journal   (Followers: 42, SJR: 0.144, h-index: 15)
Behavioral Ecology     Hybrid Journal   (Followers: 51, SJR: 1.698, h-index: 92)
Bioinformatics     Hybrid Journal   (Followers: 289, SJR: 4.643, h-index: 271)
Biology Methods and Protocols     Hybrid Journal  
Biology of Reproduction     Full-text available via subscription   (Followers: 10, SJR: 1.646, h-index: 149)
Biometrika     Hybrid Journal   (Followers: 20, SJR: 2.801, h-index: 90)
BioScience     Hybrid Journal   (Followers: 30, SJR: 2.374, h-index: 154)
Bioscience Horizons : The National Undergraduate Research J.     Open Access   (Followers: 1, SJR: 0.213, h-index: 9)
Biostatistics     Hybrid Journal   (Followers: 17, SJR: 1.955, h-index: 55)
BJA : British J. of Anaesthesia     Hybrid Journal   (Followers: 162, SJR: 2.314, h-index: 133)
BJA Education     Hybrid Journal   (Followers: 64, SJR: 0.272, h-index: 20)
Brain     Hybrid Journal   (Followers: 68, SJR: 6.097, h-index: 264)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 45, SJR: 4.086, h-index: 73)
Briefings in Functional Genomics     Hybrid Journal   (Followers: 3, SJR: 1.771, h-index: 50)
British J. for the Philosophy of Science     Hybrid Journal   (Followers: 33, SJR: 1.267, h-index: 38)
British J. of Aesthetics     Hybrid Journal   (Followers: 26, SJR: 0.217, h-index: 18)
British J. of Criminology     Hybrid Journal   (Followers: 584, SJR: 1.373, h-index: 62)
British J. of Social Work     Hybrid Journal   (Followers: 86, SJR: 0.771, h-index: 53)
British Medical Bulletin     Hybrid Journal   (Followers: 7, SJR: 1.391, h-index: 84)
British Yearbook of Intl. Law     Hybrid Journal   (Followers: 31)
Bulletin of the London Mathematical Society     Hybrid Journal   (Followers: 4, SJR: 1.474, h-index: 31)
Cambridge J. of Economics     Hybrid Journal   (Followers: 61, SJR: 0.957, h-index: 59)
Cambridge J. of Regions, Economy and Society     Hybrid Journal   (Followers: 10, SJR: 1.067, h-index: 22)
Cambridge Quarterly     Hybrid Journal   (Followers: 9, SJR: 0.1, h-index: 7)
Capital Markets Law J.     Hybrid Journal   (Followers: 2)
Carcinogenesis     Hybrid Journal   (Followers: 2, SJR: 2.439, h-index: 167)
Cardiovascular Research     Hybrid Journal   (Followers: 13, SJR: 2.897, h-index: 175)
Cerebral Cortex     Hybrid Journal   (Followers: 45, SJR: 4.827, h-index: 192)
CESifo Economic Studies     Hybrid Journal   (Followers: 17, SJR: 0.501, h-index: 19)
Chemical Senses     Hybrid Journal   (Followers: 1, SJR: 1.436, h-index: 76)
Children and Schools     Hybrid Journal   (Followers: 5, SJR: 0.211, h-index: 18)
Chinese J. of Comparative Law     Hybrid Journal   (Followers: 4)
Chinese J. of Intl. Law     Hybrid Journal   (Followers: 22, SJR: 0.737, h-index: 11)
Chinese J. of Intl. Politics     Hybrid Journal   (Followers: 8, SJR: 1.238, h-index: 15)
Christian Bioethics: Non-Ecumenical Studies in Medical Morality     Hybrid Journal   (Followers: 10, SJR: 0.191, h-index: 8)
Classical Receptions J.     Hybrid Journal   (Followers: 25, SJR: 0.1, h-index: 3)
Clean Energy     Open Access  
Clinical Infectious Diseases     Hybrid Journal   (Followers: 62, SJR: 4.742, h-index: 261)
Clinical Kidney J.     Open Access   (Followers: 3, SJR: 0.338, h-index: 19)
Communication Theory     Hybrid Journal   (Followers: 21, SJR: 2.62, h-index: 53)
Communication, Culture & Critique     Hybrid Journal   (Followers: 25)
Community Development J.     Hybrid Journal   (Followers: 27, SJR: 0.47, h-index: 28)
Computer J.     Hybrid Journal   (Followers: 9, SJR: 0.371, h-index: 47)
Conservation Physiology     Open Access   (Followers: 2)
Contemporary Women's Writing     Hybrid Journal   (Followers: 9, SJR: 0.111, h-index: 3)
Contributions to Political Economy     Hybrid Journal   (Followers: 5, SJR: 0.313, h-index: 10)
Critical Values     Full-text available via subscription  
Current Developments in Nutrition     Open Access  
Current Legal Problems     Hybrid Journal   (Followers: 27)
Current Zoology     Full-text available via subscription   (Followers: 1, SJR: 0.999, h-index: 20)
Database : The J. of Biological Databases and Curation     Open Access   (Followers: 8, SJR: 1.068, h-index: 24)
Digital Scholarship in the Humanities     Hybrid Journal   (Followers: 14)
Diplomatic History     Hybrid Journal   (Followers: 20, SJR: 0.296, h-index: 22)
DNA Research     Open Access   (Followers: 5, SJR: 2.42, h-index: 77)
Dynamics and Statistics of the Climate System     Open Access   (Followers: 3)
Early Music     Hybrid Journal   (Followers: 15, SJR: 0.124, h-index: 11)
Economic Policy     Hybrid Journal   (Followers: 39, SJR: 2.052, h-index: 52)
ELT J.     Hybrid Journal   (Followers: 25, SJR: 1.26, h-index: 23)
English Historical Review     Hybrid Journal   (Followers: 51, SJR: 0.311, h-index: 10)
English: J. of the English Association     Hybrid Journal   (Followers: 14, SJR: 0.144, h-index: 3)
Environmental Entomology     Full-text available via subscription   (Followers: 11, SJR: 0.791, h-index: 66)
Environmental Epigenetics     Open Access   (Followers: 3)
Environmental History     Hybrid Journal   (Followers: 26, SJR: 0.197, h-index: 25)
EP-Europace     Hybrid Journal   (Followers: 2, SJR: 2.201, h-index: 71)
Epidemiologic Reviews     Hybrid Journal   (Followers: 9, SJR: 3.917, h-index: 81)
ESHRE Monographs     Hybrid Journal  
Essays in Criticism     Hybrid Journal   (Followers: 16, SJR: 0.1, h-index: 6)
European Heart J.     Hybrid Journal   (Followers: 54, SJR: 6.997, h-index: 227)
European Heart J. - Cardiovascular Imaging     Hybrid Journal   (Followers: 8, SJR: 2.044, h-index: 58)
European Heart J. - Cardiovascular Pharmacotherapy     Full-text available via subscription   (Followers: 1)
European Heart J. - Quality of Care and Clinical Outcomes     Hybrid Journal  
European Heart J. Supplements     Hybrid Journal   (Followers: 7, SJR: 0.152, h-index: 31)
European J. of Cardio-Thoracic Surgery     Hybrid Journal   (Followers: 9, SJR: 1.568, h-index: 104)
European J. of Intl. Law     Hybrid Journal   (Followers: 172, SJR: 0.722, h-index: 38)
European J. of Orthodontics     Hybrid Journal   (Followers: 4, SJR: 1.09, h-index: 60)
European J. of Public Health     Hybrid Journal   (Followers: 20, SJR: 1.284, h-index: 64)
European Review of Agricultural Economics     Hybrid Journal   (Followers: 10, SJR: 1.549, h-index: 42)
European Review of Economic History     Hybrid Journal   (Followers: 28, SJR: 0.628, h-index: 24)
European Sociological Review     Hybrid Journal   (Followers: 40, SJR: 2.061, h-index: 53)
Evolution, Medicine, and Public Health     Open Access   (Followers: 10)
Family Practice     Hybrid Journal   (Followers: 14, SJR: 1.048, h-index: 77)
Fems Microbiology Ecology     Hybrid Journal   (Followers: 10, SJR: 1.687, h-index: 115)
Fems Microbiology Letters     Hybrid Journal   (Followers: 22, SJR: 1.126, h-index: 118)
Fems Microbiology Reviews     Hybrid Journal   (Followers: 27, SJR: 7.587, h-index: 150)
Fems Yeast Research     Hybrid Journal   (Followers: 14, SJR: 1.213, h-index: 66)
Food Quality and Safety     Open Access  
Foreign Policy Analysis     Hybrid Journal   (Followers: 23, SJR: 0.859, h-index: 10)
Forest Science     Hybrid Journal   (Followers: 4, SJR: 0.872, h-index: 59)
Forestry: An Intl. J. of Forest Research     Hybrid Journal   (Followers: 16, SJR: 0.903, h-index: 44)
Forum for Modern Language Studies     Hybrid Journal   (Followers: 6, SJR: 0.108, h-index: 6)
French History     Hybrid Journal   (Followers: 32, SJR: 0.123, h-index: 10)
French Studies     Hybrid Journal   (Followers: 20, SJR: 0.119, h-index: 7)
French Studies Bulletin     Hybrid Journal   (Followers: 10, SJR: 0.102, h-index: 3)
Gastroenterology Report     Open Access   (Followers: 2)
Genome Biology and Evolution     Open Access   (Followers: 12, SJR: 3.22, h-index: 39)
Geophysical J. Intl.     Hybrid Journal   (Followers: 35, SJR: 1.839, h-index: 119)
German History     Hybrid Journal   (Followers: 22, SJR: 0.437, h-index: 13)
GigaScience     Open Access   (Followers: 3)
Global Summitry     Hybrid Journal   (Followers: 1)
Glycobiology     Hybrid Journal   (Followers: 14, SJR: 1.692, h-index: 101)
Health and Social Work     Hybrid Journal   (Followers: 55, SJR: 0.505, h-index: 40)
Health Education Research     Hybrid Journal   (Followers: 13, SJR: 0.814, h-index: 80)
Health Policy and Planning     Hybrid Journal   (Followers: 24, SJR: 1.628, h-index: 66)
Health Promotion Intl.     Hybrid Journal   (Followers: 21, SJR: 0.664, h-index: 60)
History Workshop J.     Hybrid Journal   (Followers: 29, SJR: 0.313, h-index: 20)
Holocaust and Genocide Studies     Hybrid Journal   (Followers: 26, SJR: 0.115, h-index: 13)
Human Communication Research     Hybrid Journal   (Followers: 13, SJR: 2.199, h-index: 61)
Human Molecular Genetics     Hybrid Journal   (Followers: 8, SJR: 4.288, h-index: 233)
Human Reproduction     Hybrid Journal   (Followers: 72, SJR: 2.271, h-index: 179)
Human Reproduction Update     Hybrid Journal   (Followers: 17, SJR: 4.678, h-index: 128)
Human Rights Law Review     Hybrid Journal   (Followers: 60, SJR: 0.7, h-index: 21)
ICES J. of Marine Science: J. du Conseil     Hybrid Journal   (Followers: 51, SJR: 1.233, h-index: 88)
ICSID Review     Hybrid Journal   (Followers: 12)
ILAR J.     Hybrid Journal   (Followers: 2, SJR: 1.099, h-index: 51)
IMA J. of Applied Mathematics     Hybrid Journal   (SJR: 0.329, h-index: 26)
IMA J. of Management Mathematics     Hybrid Journal   (SJR: 0.351, h-index: 20)
IMA J. of Mathematical Control and Information     Hybrid Journal   (Followers: 2, SJR: 0.661, h-index: 28)
IMA J. of Numerical Analysis - advance access     Hybrid Journal   (SJR: 2.032, h-index: 44)
Industrial and Corporate Change     Hybrid Journal   (Followers: 10, SJR: 1.37, h-index: 81)
Industrial Law J.     Hybrid Journal   (Followers: 34, SJR: 0.184, h-index: 15)
Inflammatory Bowel Diseases     Hybrid Journal   (Followers: 42, SJR: 1.994, h-index: 107)
Information and Inference     Free  
Integrative and Comparative Biology     Hybrid Journal   (Followers: 7, SJR: 1.911, h-index: 90)
Interacting with Computers     Hybrid Journal   (Followers: 10, SJR: 0.529, h-index: 59)
Interactive CardioVascular and Thoracic Surgery     Hybrid Journal   (Followers: 6, SJR: 0.743, h-index: 35)
Intl. Affairs     Hybrid Journal   (Followers: 56, SJR: 1.264, h-index: 53)
Intl. Data Privacy Law     Hybrid Journal   (Followers: 31)
Intl. Health     Hybrid Journal   (Followers: 5, SJR: 0.835, h-index: 15)
Intl. Immunology     Hybrid Journal   (Followers: 3, SJR: 1.613, h-index: 111)
Intl. J. for Quality in Health Care     Hybrid Journal   (Followers: 34, SJR: 1.593, h-index: 69)
Intl. J. of Constitutional Law     Hybrid Journal   (Followers: 64, SJR: 0.613, h-index: 19)
Intl. J. of Epidemiology     Hybrid Journal   (Followers: 195, SJR: 4.381, h-index: 145)
Intl. J. of Law and Information Technology     Hybrid Journal   (Followers: 5, SJR: 0.247, h-index: 8)
Intl. J. of Law, Policy and the Family     Hybrid Journal   (Followers: 30, SJR: 0.307, h-index: 15)
Intl. J. of Lexicography     Hybrid Journal   (Followers: 10, SJR: 0.404, h-index: 18)
Intl. J. of Low-Carbon Technologies     Open Access   (Followers: 1, SJR: 0.457, h-index: 12)
Intl. J. of Neuropsychopharmacology     Open Access   (Followers: 3, SJR: 1.69, h-index: 79)
Intl. J. of Public Opinion Research     Hybrid Journal   (Followers: 9, SJR: 0.906, h-index: 33)
Intl. J. of Refugee Law     Hybrid Journal   (Followers: 35, SJR: 0.231, h-index: 21)
Intl. J. of Transitional Justice     Hybrid Journal   (Followers: 12, SJR: 0.833, h-index: 12)
Intl. Mathematics Research Notices     Hybrid Journal   (Followers: 1, SJR: 2.052, h-index: 42)
Intl. Political Sociology     Hybrid Journal   (Followers: 36, SJR: 1.339, h-index: 19)
Intl. Relations of the Asia-Pacific     Hybrid Journal   (Followers: 22, SJR: 0.539, h-index: 17)
Intl. Studies Perspectives     Hybrid Journal   (Followers: 9, SJR: 0.998, h-index: 28)
Intl. Studies Quarterly     Hybrid Journal   (Followers: 44, SJR: 2.184, h-index: 68)
Intl. Studies Review     Hybrid Journal   (Followers: 20, SJR: 0.783, h-index: 38)
ISLE: Interdisciplinary Studies in Literature and Environment     Hybrid Journal   (Followers: 1, SJR: 0.155, h-index: 4)
ITNOW     Hybrid Journal   (Followers: 1, SJR: 0.102, h-index: 4)
J. of African Economies     Hybrid Journal   (Followers: 14, SJR: 0.647, h-index: 30)
J. of American History     Hybrid Journal   (Followers: 45, SJR: 0.286, h-index: 34)
J. of Analytical Toxicology     Hybrid Journal   (Followers: 14, SJR: 1.038, h-index: 60)
J. of Antimicrobial Chemotherapy     Hybrid Journal   (Followers: 14, SJR: 2.157, h-index: 149)
J. of Antitrust Enforcement     Hybrid Journal   (Followers: 1)
J. of Applied Poultry Research     Hybrid Journal   (Followers: 4, SJR: 0.563, h-index: 43)
J. of Biochemistry     Hybrid Journal   (Followers: 41, SJR: 1.341, h-index: 96)
J. of Burn Care & Research     Hybrid Journal   (Followers: 9, SJR: 0.713, h-index: 57)
J. of Chromatographic Science     Hybrid Journal   (Followers: 18, SJR: 0.448, h-index: 42)
J. of Church and State     Hybrid Journal   (Followers: 11, SJR: 0.167, h-index: 11)
J. of Communication     Hybrid Journal   (Followers: 50, SJR: 3.327, h-index: 82)
J. of Competition Law and Economics     Hybrid Journal   (Followers: 35, SJR: 0.442, h-index: 16)
J. of Complex Networks     Hybrid Journal   (Followers: 2, SJR: 1.165, h-index: 5)
J. of Computer-Mediated Communication     Open Access   (Followers: 26, SJR: 2.878, h-index: 80)
J. of Conflict and Security Law     Hybrid Journal   (Followers: 13, SJR: 0.196, h-index: 15)
J. of Consumer Research     Full-text available via subscription   (Followers: 41, SJR: 4.896, h-index: 121)
J. of Crohn's and Colitis     Hybrid Journal   (Followers: 9, SJR: 1.543, h-index: 37)
J. of Cybersecurity     Hybrid Journal   (Followers: 3)
J. of Deaf Studies and Deaf Education     Hybrid Journal   (Followers: 8, SJR: 0.69, h-index: 36)

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover Computer Journal
  [SJR: 0.371]   [H-I: 47]   [9 followers]  Follow
    
   Hybrid Journal Hybrid journal (It can contain Open Access articles)
   ISSN (Print) 0010-4620 - ISSN (Online) 1460-2067
   Published by Oxford University Press Homepage  [392 journals]
  • Weakness and Improvement of a Certificate-Based Key-Insulated Signature in
           the Standard Model
    • Authors: Lu Y; Li J, Shen J.
      Pages: 1729 - 1744
      Abstract: Certificate-based cryptography is a novel cryptographic primitive that has many attractive merits. It solves the certificate revocation problem in conventional public key cryptography and overcomes the key-escrow problem in identity-based cryptography. Recently, Li et al. presented a certificate-based key-insulated signature (CBKIS) scheme in the standard model. However, their scheme suffers from a security vulnerability caused by the malicious certification authority (CA) attack. Our cryptanalysis shows that a malicious CA is able to break its unforgeability by implanting some trapdoors in the public system parameters. To remedy the security weakness in Li et al.’s scheme, we put forward an improved CBKIS scheme. Under the complexity assumption of the square computational Diffie–Hellman problem, the improved scheme is proven to be existentially unforgeable in the standard model. Compared with the original CBKIS scheme proposed by Li et al., it enjoys better performance while offering stronger security guarantee as it can resist the malicious CA attack.
      PubDate: Tue, 28 Mar 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx031
      Issue No: Vol. 60, No. 12 (2017)
       
  • Detection of Phishing Websites Based on Probabilistic Neural Networks and
           K-Medoids Clustering
    • Authors: El-Alfy E.
      Pages: 1745 - 1759
      Abstract: With the increasing rate and catastrophic consequences of phishing attacks, research on anti-phishing solutions has gained growing importance in information security. Security risks may include information leakage, identity theft, financial loss and reputation sabotage. Raising human awareness is not a sufficient mitigation method and deploying complementary technical solutions is a crucial requirement. Although various approaches have been proposed in the literature, the design of efficient phishing detection models is a challenging task and the problem still lacks a complete solution. In this paper, we present a novel approach for detecting phishing websites based on probabilistic neural networks (PNNs). We also investigate the integration of PNN with K-medoids clustering to significantly reduce complexity without jeopardizing the detection accuracy. To assess the feasibility of the proposed approach, we conducted in-depth study to evaluate various performance measures on a publicly available data set composed of 11 055 phishing and benign websites. The experimental results show that more accurate models can be built and even with >40% reduction in the complexity, >97% accuracy can be achieved with low false errors.
      PubDate: Tue, 18 Apr 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx035
      Issue No: Vol. 60, No. 12 (2017)
       
  • Satisfiability-Based Privacy-Aware Cloud Computing
    • Authors: Wakrime A.
      Pages: 1760 - 1769
      Abstract: Cloud Computing-based Software as a Service (SaaS) combines multiple Web Services in order to satisfy an SaaS request. SaaS is based on service-oriented architecture and Web Service technology which are popular paradigm to design new generation of applications. In addition, SaaS composition can maintain Data as a Service (DaaS) to answer the needs of a customer that cannot be satisfied by a single Web Service. SaaS/DaaS composition may reveal privacy sensitive information. In this paper, we propose a formal model of privacy in order to verify compatibility of services involved in this composition in terms of their privacy capabilities. We propose a new technique that translates the problem of minimum SaaS/DaaS Web Services Composition within preserved-privacy into Satisfiability problem. We propose also a generalization of this approach to take into account the Quality of Service. In order to show that our approach is feasible and efficient in practice, experiment results are provided as a benchmark.
      PubDate: Fri, 28 Apr 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx039
      Issue No: Vol. 60, No. 12 (2017)
       
  • Detection of SIP-Based Denial of Service Attack Using Dual Cost
           Formulation of Support Vector Machine
    • Authors: Pougajendy J; Parthiban A.
      Pages: 1770 - 1784
      Abstract: The stateful property of Session Initiation Protocol (SIP) is exploited to cause a massive disruption to the SIP service. Existing SIP-Denial of Service defense mechanisms fail to detect low-rate floods, and consume higher detection time. We have generated SIP traffic in our laboratory and the performance of the classifiers was empirically evaluated. From the experimental results, it is evident that Support Vector Machine (SVM) performed fairly well compared to the other classifiers, but resulted in some false positives and false negatives. Our proposed SVMBoost algorithm which uses the dual cost formulation of SVM and Neyman–Pearson approach was experimented on both high-rate and low-rate message flooding data sets. SVMBoost classification algorithm achieves high detection accuracy of 99.9% with 0% false positive rate and with 0.27% false negative rate. SVMBoost outperforms the existing algorithms with a maximum gain of 35.97% and a minimum gain of 0.28% in high-rate flooding detection and with a gain of 4.45% in low-rate flooding detection.
      PubDate: Wed, 07 Jun 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx052
      Issue No: Vol. 60, No. 12 (2017)
       
  • Homomorphic MAC from Algebraic One-Way Functions for Network Coding with
           Small Key Size
    • Authors: Wu Y; Chang J, Xue R, et al.
      Pages: 1785 - 1800
      Abstract: Network coding is a routing technique that differs from traditional ‘store-and-forward’ mechanisms. It allows intermediate nodes to modify packets in transit. It is well known that network coding can increase throughput and improve robustness in network. However, it is the messages mixing feature that makes network coding susceptive to pollution attacks. To address this problem, homomorphic message authentication codes (MACs) have been proposed. The existing homomorphic MAC schemes adopt inner product to authenticate a message with a tag over a field Fq. In practical instantiations, the size of the field Fq is normally chosen (or desired) to be small (typically set as 28) to limit computational and communication overheads. In these settings, an adversary will break the schemes with probability at least 1/q (typically 1/28). The security is not guaranteed in this case. To waver the limitations and enhance the security, multiple tags are adopted for each message, that certainly incurs large key size overhead and is not preferred in applications. A scheme of homomorphic MAC with preferring security and shorter keys is much expected, and till now, to our knowledge, is not successfully constructed. This work solves this problem by presenting a new homomorphic MAC scheme for authentication in network coding. The proposed scheme allows us to authenticate a message in a linear space over a field of moderate size and at the same time, achieves a reliable security with a short key. The construction is based on a recently invented somewhat public-key notion: algebraic one-way function, by Catalano et al. (TCC 2013). Compared to the existing schemes, our scheme possesses the advantages that it achieves stronger security with much shorter keys, and is practical in applications. Hence resolve the longstanding problem.
      PubDate: Fri, 23 Jun 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx055
      Issue No: Vol. 60, No. 12 (2017)
       
  • Comment on ‘Attribute-Based Signatures for Supporting Anonymous
           Certification’ by N. Kaaniche and M. Laurent (ESORICS 2016)
    • Authors: Vergnaud D.
      Pages: 1801 - 1808
      Abstract: Anonymous credential systems enable users to authenticate themselves in a privacy-preserving manner. At the conference ESORICS 2016, Kaaniche and Laurent presented an anonymous certification scheme based on a new attribute based signature. In this note, we provide several attacks on their scheme.
      PubDate: Wed, 07 Jun 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx058
      Issue No: Vol. 60, No. 12 (2017)
       
  • Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
    • Authors: Lai J; Mu Y, Guo F, et al.
      Pages: 1809 - 1821
      Abstract: A revocable ID-based broadcast encryption scheme allows an authorized third party to revoke any receiver (decryptor) from the initial receiver set S of the original broadcast ciphertext without the need of decryption. However, the existing revocable ID-based broadcast encryption schemes in the literature cannot fully preserve the receiver privacy and have a large size of ciphertext when the revoked user sets are large. To solve these problems, in this paper, we propose a novel scheme: fully privacy-preserving ID-based broadcast encryption with authorization. Our scheme allows an authorized party to dynamically handle the decryption rights of receivers via an authorized user set L without knowing the message and the identities of the initial receivers. Only those users who are both in S and L can decrypt the ciphertext successfully. The final ciphertext reveals nothing about the identity information of receivers and the authorized users. Our scheme achieves full collusion resistance and is applicable to anonymous data sharing where the receivers are decided by the authorized third party (or multiple authorized third parties) excluding the data owner. We show that our proposed scheme is provably secure under the defined security models in the random oracle model.
      PubDate: Wed, 07 Jun 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx060
      Issue No: Vol. 60, No. 12 (2017)
       
  • Authorized Equi-join for Multiple Data Contributors in the PKC-Based
           Setting
    • Authors: Ma S.
      Pages: 1822 - 1838
      Abstract: The Database-As-a-Service (DaaS) model provides seamless mechanisms for database management and service. As a countermeasure to security treats, encryption technologies have been widely adopted in database systems. Accordingly, privacy-preserving queries on encrypted databases has become an important research topic. In this paper, we present the first solution of authorized equi-join for multiple data contributors in the PKC-based setting. With the improved ciphertext security under checkability, our underlying cryptographic construction could be used independently as a standard procedure for many other relational operations, for instance, intersection, difference, and set union. As a feature, our scheme allows flexible authorization policies for the join operation by the controlled trapdoor transitivity, which has not yet been studied thoroughly in the literature. Our proposed scheme is efficient in encryption and execution and has a reasonable ciphertext size. It can be applied as a building block for data query in the DaaS model.
      PubDate: Wed, 07 Jun 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx061
      Issue No: Vol. 60, No. 12 (2017)
       
  • Statistical Cipher Feedback of Stream Ciphers
    • Authors: Heys H.
      Pages: 1839 - 1851
      Abstract: In this paper, we examine a method of constructing a self-synchronizing stream cipher referred to as statistical cipher feedback (SCFB). Although recently studied as a mode for block ciphers, we explicitly consider the application of SCFB to hardware-oriented stream ciphers. Specifically, we show that SCFB can be used to realize a self-synchronizing stream cipher that has the characteristics of compact, efficient hardware implementations and is secure given that the underlying synchrononous stream cipher is secure. Further, we consider the communication properties of the SCFB system and examine the relationships between these properties and the implementation characteristics.
      PubDate: Thu, 13 Jul 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx068
      Issue No: Vol. 60, No. 12 (2017)
       
  • Difference-Comparison-based Malicious Meter Inspection in Neighborhood
           Area Networks in Smart Grid
    • Authors: Xia X; Liang W, Xiao Y, et al.
      Pages: 1852 - 1870
      Abstract: As the smart meters are vulnerable to physical attacks as well as cyber attacks, electricity theft in smart grids is much easier to commit and more difficult to detect than that in traditional power grids. In this paper, to facilitate the inspection of the malicious meters, a full and complete binary inspection tree whose leaves stand for smart meters is employed as a logical structure. We can logically configure an inspector (a meter for detection) at any node on the tree. By calculating the difference between the inspector’s reading and the summation of the readings reported from the smart meters on the subtree of one node, as well as the difference between the total amount of stolen electricity on the subtrees of an internal node and its left child, we propose a difference-comparison-based inspection algorithm which allows the inspector to skip a large number of nodes on the tree and hence accelerates the detection speed of the malicious meters remarkably. Furthermore, for quickly identifying a complete set of malicious meters, we propose an adaptive reporting mechanism which adopts much shorter reporting periods during the inspection process. Analysis with proofs about the performance bounds of the proposed algorithm in terms of the number of inspection steps is provided. Simulations not only validate the theoretical analysis, but also show the superiority of the proposed algorithm over the existing works in terms of inspection steps, regardless of the ratio and the permutation of malicious meters.
      PubDate: Fri, 08 Sep 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx070
      Issue No: Vol. 60, No. 12 (2017)
       
  • Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds
    • Authors: Liu W; Liu X, Liu J, et al.
      Pages: 1871 - 1888
      Abstract: Electronic Health Record (EHR) systems bring an abundance of convenience for telediagnosis, medical data sharing and management. A main obstacle for wide adoption of EHR systems is due to the privacy concerns of patients. In this work, we propose a role-based access control (RBAC) scheme for EHR systems to secure private EHRs. In our RBAC, there are two main types of roles, namely independent patients and hierarchically organized medical staffs. A patient is identified by his/her identity, and a medical staff is recognized by his/her role in the medical institute. A user can comprehend an EHR only if he/she satisfies the access policy associated with this EHR, which implies a fine-grained access control. A public auditor is employed to verify whether the EHR is correctly encapsulated with the specified access policy, which provides an a priori approach to find fraudulent EHRs and reduce potential medical disputes. Moreover, our RBAC enforces a forward revocation mechanism. A revoked user cannot access the future EHRs even if his/her previous role satisfies the access policy. These security properties are formally proven under well-established assumptions. Theoretical and experimental analyses show the efficiency of our RBAC in terms of communication and computation.
      PubDate: Thu, 10 Aug 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx071
      Issue No: Vol. 60, No. 12 (2017)
       
  • ASCENT: A Provably Terminating Decentralized Logging Service
    • Authors: Bonnaire X; Cortés R, Kordon F, et al.
      Pages: 1889 - 1911
      Abstract: Building a certification authority that is both decentralized and fully reliable is impossible. However, the limitation thus imposed on scalability is unacceptable for many types of information systems, such as e-government services, which require an infrastructure able to support heavy computation loads while remaining highly reliable. Our scalable approach opts for the next best thing to full reliability: a certification authority with a probability of arbitrary failure so low that, in practice, false positives should never occur.
      PubDate: Thu, 07 Sep 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx076
      Issue No: Vol. 60, No. 12 (2017)
       
  • Partitioned Group Password-Based Authenticated Key Exchange
    • Authors: Fiore D; Vasco M, Soriente C.
      Pages: 1912 - 1922
      Abstract: Group Password-Based Authenticated Key Exchange (GPAKE) allows a group of users to establish a secret key, as long as all of them share the same password. However, in existing GPAKE protocols as soon as one user runs the protocol with a non-matching password, all the others abort and no key is established. In this paper we seek for a more flexible, yet secure, GPAKE and put forward the notion of partitionedGPAKE. Partitioned GPAKE tolerates users that run the protocol on different passwords. Through a protocol run, any subgroup of users that indeed share a password, establish a session key, factoring out the ‘noise’ of inputs by users holding different passwords. At the same time any two keys, each established by a different subgroup of users, are pair-wise independent if the corresponding subgroups hold different passwords. We also introduce the notion of password-privacy for partitioned GPAKE, which is a kind of affiliation hiding property, ensuring that an adversary should not be able to tell whether any given set of users share a password. Finally, we propose an efficient instantiation of partitioned GPAKE building on an unforgeable symmetric encryption scheme and a PAKE by Bellare et al. Our proposal is proven secure in the random oracle/ideal cipher model, and requires only two communication rounds.
      PubDate: Thu, 21 Sep 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx078
      Issue No: Vol. 60, No. 12 (2017)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.162.163.181
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-