for Journals by Title or ISSN
for Articles by Keywords

Publisher: Oxford University Press   (Total: 396 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 396 Journals sorted alphabetically
ACS Symposium Series     Full-text available via subscription   (SJR: 0.189, CiteScore: 0)
Acta Biochimica et Biophysica Sinica     Hybrid Journal   (Followers: 5, SJR: 0.79, CiteScore: 2)
Adaptation     Hybrid Journal   (Followers: 9, SJR: 0.143, CiteScore: 0)
Advances in Nutrition     Hybrid Journal   (Followers: 46, SJR: 2.196, CiteScore: 5)
Aesthetic Surgery J.     Hybrid Journal   (Followers: 6, SJR: 1.434, CiteScore: 1)
African Affairs     Hybrid Journal   (Followers: 64, SJR: 1.869, CiteScore: 2)
Age and Ageing     Hybrid Journal   (Followers: 91, SJR: 1.989, CiteScore: 4)
Alcohol and Alcoholism     Hybrid Journal   (Followers: 18, SJR: 1.376, CiteScore: 3)
American Entomologist     Full-text available via subscription   (Followers: 7)
American Historical Review     Hybrid Journal   (Followers: 152, SJR: 0.467, CiteScore: 1)
American J. of Agricultural Economics     Hybrid Journal   (Followers: 41, SJR: 2.113, CiteScore: 3)
American J. of Clinical Nutrition     Hybrid Journal   (Followers: 145, SJR: 3.438, CiteScore: 6)
American J. of Epidemiology     Hybrid Journal   (Followers: 176, SJR: 2.713, CiteScore: 3)
American J. of Hypertension     Hybrid Journal   (Followers: 25, SJR: 1.322, CiteScore: 3)
American J. of Jurisprudence     Hybrid Journal   (Followers: 18, SJR: 0.281, CiteScore: 1)
American J. of Legal History     Full-text available via subscription   (Followers: 8, SJR: 0.116, CiteScore: 0)
American Law and Economics Review     Hybrid Journal   (Followers: 27, SJR: 1.053, CiteScore: 1)
American Literary History     Hybrid Journal   (Followers: 15, SJR: 0.391, CiteScore: 0)
Analysis     Hybrid Journal   (Followers: 21, SJR: 1.038, CiteScore: 1)
Animal Frontiers     Hybrid Journal  
Annals of Behavioral Medicine     Hybrid Journal   (Followers: 15, SJR: 1.423, CiteScore: 3)
Annals of Botany     Hybrid Journal   (Followers: 36, SJR: 1.721, CiteScore: 4)
Annals of Oncology     Hybrid Journal   (Followers: 42, SJR: 5.599, CiteScore: 9)
Annals of the Entomological Society of America     Full-text available via subscription   (Followers: 10, SJR: 0.722, CiteScore: 1)
Annals of Work Exposures and Health     Hybrid Journal   (Followers: 32, SJR: 0.728, CiteScore: 2)
AoB Plants     Open Access   (Followers: 4, SJR: 1.28, CiteScore: 3)
Applied Economic Perspectives and Policy     Hybrid Journal   (Followers: 18, SJR: 0.858, CiteScore: 2)
Applied Linguistics     Hybrid Journal   (Followers: 56, SJR: 2.987, CiteScore: 3)
Applied Mathematics Research eXpress     Hybrid Journal   (Followers: 1, SJR: 1.241, CiteScore: 1)
Arbitration Intl.     Full-text available via subscription   (Followers: 20)
Arbitration Law Reports and Review     Hybrid Journal   (Followers: 14)
Archives of Clinical Neuropsychology     Hybrid Journal   (Followers: 30, SJR: 0.731, CiteScore: 2)
Aristotelian Society Supplementary Volume     Hybrid Journal   (Followers: 3)
Arthropod Management Tests     Hybrid Journal   (Followers: 2)
Astronomy & Geophysics     Hybrid Journal   (Followers: 43, SJR: 0.146, CiteScore: 0)
Behavioral Ecology     Hybrid Journal   (Followers: 52, SJR: 1.871, CiteScore: 3)
Bioinformatics     Hybrid Journal   (Followers: 304, SJR: 6.14, CiteScore: 8)
Biology Methods and Protocols     Hybrid Journal  
Biology of Reproduction     Full-text available via subscription   (Followers: 10, SJR: 1.446, CiteScore: 3)
Biometrika     Hybrid Journal   (Followers: 20, SJR: 3.485, CiteScore: 2)
BioScience     Hybrid Journal   (Followers: 29, SJR: 2.754, CiteScore: 4)
Bioscience Horizons : The National Undergraduate Research J.     Open Access   (Followers: 1, SJR: 0.146, CiteScore: 0)
Biostatistics     Hybrid Journal   (Followers: 17, SJR: 1.553, CiteScore: 2)
BJA : British J. of Anaesthesia     Hybrid Journal   (Followers: 165, SJR: 2.115, CiteScore: 3)
BJA Education     Hybrid Journal   (Followers: 64)
Brain     Hybrid Journal   (Followers: 68, SJR: 5.858, CiteScore: 7)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 48, SJR: 2.505, CiteScore: 5)
Briefings in Functional Genomics     Hybrid Journal   (Followers: 3, SJR: 2.15, CiteScore: 3)
British J. for the Philosophy of Science     Hybrid Journal   (Followers: 35, SJR: 2.161, CiteScore: 2)
British J. of Aesthetics     Hybrid Journal   (Followers: 26, SJR: 0.508, CiteScore: 1)
British J. of Criminology     Hybrid Journal   (Followers: 586, SJR: 1.828, CiteScore: 3)
British J. of Social Work     Hybrid Journal   (Followers: 87, SJR: 1.019, CiteScore: 2)
British Medical Bulletin     Hybrid Journal   (Followers: 7, SJR: 1.355, CiteScore: 3)
British Yearbook of Intl. Law     Hybrid Journal   (Followers: 32)
Bulletin of the London Mathematical Society     Hybrid Journal   (Followers: 4, SJR: 1.376, CiteScore: 1)
Cambridge J. of Economics     Hybrid Journal   (Followers: 62, SJR: 0.764, CiteScore: 2)
Cambridge J. of Regions, Economy and Society     Hybrid Journal   (Followers: 11, SJR: 2.438, CiteScore: 4)
Cambridge Quarterly     Hybrid Journal   (Followers: 9, SJR: 0.104, CiteScore: 0)
Capital Markets Law J.     Hybrid Journal   (Followers: 2, SJR: 0.222, CiteScore: 0)
Carcinogenesis     Hybrid Journal   (Followers: 2, SJR: 2.135, CiteScore: 5)
Cardiovascular Research     Hybrid Journal   (Followers: 14, SJR: 3.002, CiteScore: 5)
Cerebral Cortex     Hybrid Journal   (Followers: 45, SJR: 3.892, CiteScore: 6)
CESifo Economic Studies     Hybrid Journal   (Followers: 17, SJR: 0.483, CiteScore: 1)
Chemical Senses     Hybrid Journal   (Followers: 1, SJR: 1.42, CiteScore: 3)
Children and Schools     Hybrid Journal   (Followers: 5, SJR: 0.246, CiteScore: 0)
Chinese J. of Comparative Law     Hybrid Journal   (Followers: 4, SJR: 0.412, CiteScore: 0)
Chinese J. of Intl. Law     Hybrid Journal   (Followers: 23, SJR: 0.329, CiteScore: 0)
Chinese J. of Intl. Politics     Hybrid Journal   (Followers: 9, SJR: 1.392, CiteScore: 2)
Christian Bioethics: Non-Ecumenical Studies in Medical Morality     Hybrid Journal   (Followers: 10, SJR: 0.183, CiteScore: 0)
Classical Receptions J.     Hybrid Journal   (Followers: 26, SJR: 0.123, CiteScore: 0)
Clean Energy     Open Access   (Followers: 1)
Clinical Infectious Diseases     Hybrid Journal   (Followers: 65, SJR: 5.051, CiteScore: 5)
Clinical Kidney J.     Open Access   (Followers: 3, SJR: 1.163, CiteScore: 2)
Communication Theory     Hybrid Journal   (Followers: 22, SJR: 2.424, CiteScore: 3)
Communication, Culture & Critique     Hybrid Journal   (Followers: 26, SJR: 0.222, CiteScore: 1)
Community Development J.     Hybrid Journal   (Followers: 27, SJR: 0.268, CiteScore: 1)
Computer J.     Hybrid Journal   (Followers: 9, SJR: 0.319, CiteScore: 1)
Conservation Physiology     Open Access   (Followers: 2, SJR: 1.818, CiteScore: 3)
Contemporary Women's Writing     Hybrid Journal   (Followers: 9, SJR: 0.121, CiteScore: 0)
Contributions to Political Economy     Hybrid Journal   (Followers: 5, SJR: 0.906, CiteScore: 1)
Critical Values     Full-text available via subscription  
Current Developments in Nutrition     Open Access   (Followers: 1)
Current Legal Problems     Hybrid Journal   (Followers: 27)
Current Zoology     Full-text available via subscription   (Followers: 2, SJR: 1.164, CiteScore: 2)
Database : The J. of Biological Databases and Curation     Open Access   (Followers: 8, SJR: 1.791, CiteScore: 3)
Digital Scholarship in the Humanities     Hybrid Journal   (Followers: 14, SJR: 0.259, CiteScore: 1)
Diplomatic History     Hybrid Journal   (Followers: 20, SJR: 0.45, CiteScore: 1)
DNA Research     Open Access   (Followers: 5, SJR: 2.866, CiteScore: 6)
Dynamics and Statistics of the Climate System     Open Access   (Followers: 4)
Early Music     Hybrid Journal   (Followers: 15, SJR: 0.139, CiteScore: 0)
Economic Policy     Hybrid Journal   (Followers: 39, SJR: 3.584, CiteScore: 3)
ELT J.     Hybrid Journal   (Followers: 24, SJR: 0.942, CiteScore: 1)
English Historical Review     Hybrid Journal   (Followers: 52, SJR: 0.612, CiteScore: 1)
English: J. of the English Association     Hybrid Journal   (Followers: 14, SJR: 0.1, CiteScore: 0)
Environmental Entomology     Full-text available via subscription   (Followers: 11, SJR: 0.818, CiteScore: 2)
Environmental Epigenetics     Open Access   (Followers: 3)
Environmental History     Hybrid Journal   (Followers: 27, SJR: 0.408, CiteScore: 1)
EP-Europace     Hybrid Journal   (Followers: 2, SJR: 2.748, CiteScore: 4)
Epidemiologic Reviews     Hybrid Journal   (Followers: 9, SJR: 4.505, CiteScore: 8)
ESHRE Monographs     Hybrid Journal  
Essays in Criticism     Hybrid Journal   (Followers: 17, SJR: 0.113, CiteScore: 0)
European Heart J.     Hybrid Journal   (Followers: 57, SJR: 9.315, CiteScore: 9)
European Heart J. - Cardiovascular Imaging     Hybrid Journal   (Followers: 9, SJR: 3.625, CiteScore: 3)
European Heart J. - Cardiovascular Pharmacotherapy     Full-text available via subscription   (Followers: 1)
European Heart J. - Quality of Care and Clinical Outcomes     Hybrid Journal  
European Heart J. : Case Reports     Open Access  
European Heart J. Supplements     Hybrid Journal   (Followers: 8, SJR: 0.223, CiteScore: 0)
European J. of Cardio-Thoracic Surgery     Hybrid Journal   (Followers: 9, SJR: 1.681, CiteScore: 2)
European J. of Intl. Law     Hybrid Journal   (Followers: 188, SJR: 0.694, CiteScore: 1)
European J. of Orthodontics     Hybrid Journal   (Followers: 4, SJR: 1.279, CiteScore: 2)
European J. of Public Health     Hybrid Journal   (Followers: 20, SJR: 1.36, CiteScore: 2)
European Review of Agricultural Economics     Hybrid Journal   (Followers: 10, SJR: 1.172, CiteScore: 2)
European Review of Economic History     Hybrid Journal   (Followers: 29, SJR: 0.702, CiteScore: 1)
European Sociological Review     Hybrid Journal   (Followers: 40, SJR: 2.728, CiteScore: 3)
Evolution, Medicine, and Public Health     Open Access   (Followers: 11)
Family Practice     Hybrid Journal   (Followers: 15, SJR: 1.018, CiteScore: 2)
Fems Microbiology Ecology     Hybrid Journal   (Followers: 12, SJR: 1.492, CiteScore: 4)
Fems Microbiology Letters     Hybrid Journal   (Followers: 24, SJR: 0.79, CiteScore: 2)
Fems Microbiology Reviews     Hybrid Journal   (Followers: 30, SJR: 7.063, CiteScore: 13)
Fems Yeast Research     Hybrid Journal   (Followers: 14, SJR: 1.308, CiteScore: 3)
Food Quality and Safety     Open Access   (Followers: 1)
Foreign Policy Analysis     Hybrid Journal   (Followers: 23, SJR: 1.425, CiteScore: 1)
Forest Science     Hybrid Journal   (Followers: 7, SJR: 0.89, CiteScore: 2)
Forestry: An Intl. J. of Forest Research     Hybrid Journal   (Followers: 16, SJR: 1.133, CiteScore: 3)
Forum for Modern Language Studies     Hybrid Journal   (Followers: 6, SJR: 0.104, CiteScore: 0)
French History     Hybrid Journal   (Followers: 33, SJR: 0.118, CiteScore: 0)
French Studies     Hybrid Journal   (Followers: 20, SJR: 0.148, CiteScore: 0)
French Studies Bulletin     Hybrid Journal   (Followers: 10, SJR: 0.152, CiteScore: 0)
Gastroenterology Report     Open Access   (Followers: 2)
Genome Biology and Evolution     Open Access   (Followers: 12, SJR: 2.578, CiteScore: 4)
Geophysical J. Intl.     Hybrid Journal   (Followers: 35, SJR: 1.506, CiteScore: 3)
German History     Hybrid Journal   (Followers: 22, SJR: 0.161, CiteScore: 0)
GigaScience     Open Access   (Followers: 4, SJR: 5.022, CiteScore: 7)
Global Summitry     Hybrid Journal   (Followers: 1)
Glycobiology     Hybrid Journal   (Followers: 14, SJR: 1.493, CiteScore: 3)
Health and Social Work     Hybrid Journal   (Followers: 56, SJR: 0.388, CiteScore: 1)
Health Education Research     Hybrid Journal   (Followers: 15, SJR: 0.854, CiteScore: 2)
Health Policy and Planning     Hybrid Journal   (Followers: 24, SJR: 1.512, CiteScore: 2)
Health Promotion Intl.     Hybrid Journal   (Followers: 22, SJR: 0.812, CiteScore: 2)
History Workshop J.     Hybrid Journal   (Followers: 31, SJR: 1.278, CiteScore: 1)
Holocaust and Genocide Studies     Hybrid Journal   (Followers: 28, SJR: 0.105, CiteScore: 0)
Human Communication Research     Hybrid Journal   (Followers: 13, SJR: 2.146, CiteScore: 3)
Human Molecular Genetics     Hybrid Journal   (Followers: 8, SJR: 3.555, CiteScore: 5)
Human Reproduction     Hybrid Journal   (Followers: 71, SJR: 2.643, CiteScore: 5)
Human Reproduction Open     Open Access  
Human Reproduction Update     Hybrid Journal   (Followers: 19, SJR: 5.317, CiteScore: 10)
Human Rights Law Review     Hybrid Journal   (Followers: 56, SJR: 0.756, CiteScore: 1)
ICES J. of Marine Science: J. du Conseil     Hybrid Journal   (Followers: 53, SJR: 1.591, CiteScore: 3)
ICSID Review     Hybrid Journal   (Followers: 10)
ILAR J.     Hybrid Journal   (Followers: 2, SJR: 1.732, CiteScore: 4)
IMA J. of Applied Mathematics     Hybrid Journal   (SJR: 0.679, CiteScore: 1)
IMA J. of Management Mathematics     Hybrid Journal   (SJR: 0.538, CiteScore: 1)
IMA J. of Mathematical Control and Information     Hybrid Journal   (Followers: 2, SJR: 0.496, CiteScore: 1)
IMA J. of Numerical Analysis - advance access     Hybrid Journal   (SJR: 1.987, CiteScore: 2)
Industrial and Corporate Change     Hybrid Journal   (Followers: 10, SJR: 1.792, CiteScore: 2)
Industrial Law J.     Hybrid Journal   (Followers: 35, SJR: 0.249, CiteScore: 1)
Inflammatory Bowel Diseases     Hybrid Journal   (Followers: 44, SJR: 2.511, CiteScore: 4)
Information and Inference     Free  
Integrative and Comparative Biology     Hybrid Journal   (Followers: 8, SJR: 1.319, CiteScore: 2)
Interacting with Computers     Hybrid Journal   (Followers: 11, SJR: 0.292, CiteScore: 1)
Interactive CardioVascular and Thoracic Surgery     Hybrid Journal   (Followers: 7, SJR: 0.762, CiteScore: 1)
Intl. Affairs     Hybrid Journal   (Followers: 61, SJR: 1.505, CiteScore: 3)
Intl. Data Privacy Law     Hybrid Journal   (Followers: 25)
Intl. Health     Hybrid Journal   (Followers: 6, SJR: 0.851, CiteScore: 2)
Intl. Immunology     Hybrid Journal   (Followers: 3, SJR: 2.167, CiteScore: 4)
Intl. J. for Quality in Health Care     Hybrid Journal   (Followers: 37, SJR: 1.348, CiteScore: 2)
Intl. J. of Constitutional Law     Hybrid Journal   (Followers: 63, SJR: 0.601, CiteScore: 1)
Intl. J. of Epidemiology     Hybrid Journal   (Followers: 226, SJR: 3.969, CiteScore: 5)
Intl. J. of Law and Information Technology     Hybrid Journal   (Followers: 5, SJR: 0.202, CiteScore: 1)
Intl. J. of Law, Policy and the Family     Hybrid Journal   (Followers: 26, SJR: 0.223, CiteScore: 1)
Intl. J. of Lexicography     Hybrid Journal   (Followers: 9, SJR: 0.285, CiteScore: 1)
Intl. J. of Low-Carbon Technologies     Open Access   (Followers: 1, SJR: 0.403, CiteScore: 1)
Intl. J. of Neuropsychopharmacology     Open Access   (Followers: 3, SJR: 1.808, CiteScore: 4)
Intl. J. of Public Opinion Research     Hybrid Journal   (Followers: 9, SJR: 1.545, CiteScore: 1)
Intl. J. of Refugee Law     Hybrid Journal   (Followers: 35, SJR: 0.389, CiteScore: 1)
Intl. J. of Transitional Justice     Hybrid Journal   (Followers: 11, SJR: 0.724, CiteScore: 2)
Intl. Mathematics Research Notices     Hybrid Journal   (Followers: 1, SJR: 2.168, CiteScore: 1)
Intl. Political Sociology     Hybrid Journal   (Followers: 37, SJR: 1.465, CiteScore: 3)
Intl. Relations of the Asia-Pacific     Hybrid Journal   (Followers: 23, SJR: 0.401, CiteScore: 1)
Intl. Studies Perspectives     Hybrid Journal   (Followers: 9, SJR: 0.983, CiteScore: 1)
Intl. Studies Quarterly     Hybrid Journal   (Followers: 45, SJR: 2.581, CiteScore: 2)
Intl. Studies Review     Hybrid Journal   (Followers: 24, SJR: 1.201, CiteScore: 1)
ISLE: Interdisciplinary Studies in Literature and Environment     Hybrid Journal   (Followers: 2, SJR: 0.15, CiteScore: 0)
ITNOW     Hybrid Journal   (Followers: 1, SJR: 0.103, CiteScore: 0)
J. of African Economies     Hybrid Journal   (Followers: 15, SJR: 0.533, CiteScore: 1)
J. of American History     Hybrid Journal   (Followers: 46, SJR: 0.297, CiteScore: 1)
J. of Analytical Toxicology     Hybrid Journal   (Followers: 14, SJR: 1.065, CiteScore: 2)
J. of Antimicrobial Chemotherapy     Hybrid Journal   (Followers: 15, SJR: 2.419, CiteScore: 4)
J. of Antitrust Enforcement     Hybrid Journal   (Followers: 1)
J. of Applied Poultry Research     Hybrid Journal   (Followers: 4, SJR: 0.585, CiteScore: 1)
J. of Biochemistry     Hybrid Journal   (Followers: 40, SJR: 1.226, CiteScore: 2)
J. of Burn Care & Research     Hybrid Journal   (Followers: 9, SJR: 0.768, CiteScore: 2)
J. of Chromatographic Science     Hybrid Journal   (Followers: 18, SJR: 0.36, CiteScore: 1)
J. of Church and State     Hybrid Journal   (Followers: 11, SJR: 0.139, CiteScore: 0)
J. of Communication     Hybrid Journal   (Followers: 53, SJR: 4.411, CiteScore: 5)
J. of Competition Law and Economics     Hybrid Journal   (Followers: 35, SJR: 0.33, CiteScore: 0)
J. of Complex Networks     Hybrid Journal   (Followers: 2, SJR: 1.05, CiteScore: 4)
J. of Computer-Mediated Communication     Open Access   (Followers: 26, SJR: 2.961, CiteScore: 6)
J. of Conflict and Security Law     Hybrid Journal   (Followers: 12, SJR: 0.402, CiteScore: 0)
J. of Consumer Research     Full-text available via subscription   (Followers: 44, SJR: 5.856, CiteScore: 5)

        1 2 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover
Computer Journal
Journal Prestige (SJR): 0.319
Citation Impact (citeScore): 1
Number of Followers: 9  
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 0010-4620 - ISSN (Online) 1460-2067
Published by Oxford University Press Homepage  [396 journals]
  • Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE
    • Authors: Wang H; Tang Q, Levi A.
      Pages: 575 - 585
      Abstract: AbstractIn this paper, we introduce new methods to evaluate integer polynomials with the Gentry-Sahai-Waters fully homomorphic encryption (GSW FHE) scheme. Our solution has much slower noise growth and per homomorphic integer multiplication cost, with a ratio O((logk)w+1kw⋅n) in comparison to the original GSW scheme where k is the input plaintext width, n is the LWE dimension and ω=2.373. Technically, we reduce the integer multiplication noise by restricting the evaluation to be between two kinds of ciphertexts: one is for the message space Zq and the other is for message space F2⌈logq⌉. To achieve generality, we propose an integer bootstrapping scheme which converts these two kinds of ciphertexts into each other. To solve the ciphertext expansion problem due to ciphertexts in F2⌈logq⌉, we propose a solution based on symmetric-key encryption with stream ciphers.
      PubDate: Sat, 06 Jan 2018 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx129
      Issue No: Vol. 61, No. 4 (2018)
  • Continuous Leakage-Resilient Identity-Based Encryption without Random
    • Authors: Zhou Y; Yang B, Mu Y, et al.
      Pages: 586 - 600
      Abstract: AbstractProvably secure identity-based encryption (IBE) schemes in the presence of key-leakage have attracted a lot of attention recently. However, most of them were designed in the bounded-leakage model, and might not be able to meet the claimed security under the continuous-leakage attacks. The main issue is that the most of previous leakage-resilient IBE schemes could not ensure the randomness of all elements in the ciphertext, because some elements can be written as a function on the private key of user; therefore, the adversary can obtain the leakage on the private key of user from the corresponding given ciphertext. In this paper, a new construction of CCA-secure IBE scheme tolerating continuous-leakage attacks in the standard model is proposed, and its security is proved in the selective-ID security model based on the hardness of decisional bilinear Diffie–Hellman assumption, which is a classical static assumption. In our construction, the adversary cannot obtain any leakage on the private key from the corresponding ciphertext, since all elements in the ciphertext are random in the adversary’s view. The striking advantage of our constructions is the key leakage ratio, which is the best one among the previous leakage-resilient IBE constructions.
      PubDate: Thu, 25 Jan 2018 00:00:00 GMT
      DOI: 10.1093/comjnl/bxy003
      Issue No: Vol. 61, No. 4 (2018)
  • k-NMF Anonymization in Social Network Data Publishing
    • Authors: Macwan K; Patel S, Furnell S.
      Pages: 601 - 613
      Abstract: AbstractSocial network platforms have become very popular due to their easy access and advanced features. Although social network dataset is very useful in research and market analysis, there are different risks and attacks that can breach user privacy. Online social network such as Facebook, Google Plus and LinkedIn provide a feature that allows finding out number of mutual friends (NMF) between two users. Adversary can use such information to identify individual user and related information. As the published dataset itself reveals the information of mutual friends for every connection, it becomes very easy for an adversary to re-identify users. Existing anonymization techniques for mutual friends attack are based on edge anonymization. Such methods perform anonymization operation without considering the NMF requirement of other edges that results into more edge insertion operations and low data utility of the anonymized dataset. In this paper, we propose a k-anonymization approach that works on mutual friend sequence to ensure existence of at least k elements holding the same value such that the data utility is preserved efficiently. The vertex selection process to increase the mutual friend value for one edge reduces the requirement for other edges too. The experimental results demonstrate that the proposed anonymization approach preserves the user privacy and data utility.
      PubDate: Thu, 08 Feb 2018 00:00:00 GMT
      DOI: 10.1093/comjnl/bxy012
      Issue No: Vol. 61, No. 4 (2018)
  • Privacy Preserving, Verifiable and Resilient Data Aggregation in
           Grid-Based Networks
    • Authors: Shah K; Jinwala D, Levi A.
      Pages: 614 - 628
      Abstract: AbstractThe grid-based networks are formed by applications where objects being monitored form a square grid. These applications often demand critical security concerns as the compromise to the data yields adverse effects. There are indeed, several lightweight data aggregation schemes proposed in the literature that aims to minimize the resource overhead, albeit providing the required security attributes. However, as per our observations, the information about the actual deployment of the nodes is not exploited in any of these attempts. In this paper, we exploit the linearity in the deployment of grid-based networks to design an aggregation scheme that eventually entails lesser overhead as compared to the other existing schemes while offering the same level of resilience. As homomorphic encryption is considered to be more secure than obfuscation, we also propose a variant to the proposed scheme using homomorphic encryption. In the scenario with lesser restriction on computation, one can opt for the variant to the proposed scheme. The security analysis using mathematical induction and formal security proofs proves the security of the proposed scheme. To the best of our knowledge, the proposed scheme is the first that achieves privacy preservation, data verification, resilience against node capture and avoidance against collusion attacks in grid-based networks with lesser requirement of key storage and communication cost.
      PubDate: Tue, 13 Feb 2018 00:00:00 GMT
      DOI: 10.1093/comjnl/bxy013
      Issue No: Vol. 61, No. 4 (2018)
  • On the Security of a Pairing-Free Certificateless Signcryption Scheme
    • Authors: Zhang J; Mao J, Chen L.
      Pages: 469 - 471
      Abstract: AbstractUnforgeability is an important security property in signcryption. Recently, Yu et al. proposed a pairing-free and secure certificateless signcryption scheme and demonstrated their scheme was provably secure in the random oracle model. Unfortunately, in this letter, we show their scheme is insecure against the malicious KGC and the malicious sender through proposing two concrete attacks.
      PubDate: Thu, 07 Sep 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx081
      Issue No: Vol. 61, No. 4 (2017)
  • Risk and the Small-Scale Cyber Security Decision Making Dialogue—a
           UK Case Study
    • Authors: Osborn E; Simpson A, Loukas G.
      Pages: 472 - 495
      Abstract: AbstractDespite a long-standing understanding that developments in personal and cloud computing practices would change the way we approach security, small-scale IT users (SSITUs) remain ill-served by existing cyber security practices. This paper discusses results from a survey that considered (in part) cyber security decisions made by SSITUs. We determine that SSITUs are focusing on easy-to-implement technical measures, leading to a disconnect between the security implemented and any risks identified; available resources, knowledge, prioritization of business processes, reduced system control and a lack of threat intelligence all combine to limit the ability to make cyber security decisions; and assessing risk in SSITUs will not lead to sufficient investment to mitigate risks for risk-holding stakeholders in the supply chain. We conclude that the constraints faced by SSITUs have far greater impact on the decisions they make than either our risk-holding, or security-providing, participants may have anticipated. Any limitations faced by SSITUs as they make their security decisions will have a significant impact on both the measures they are able to apply and the security of the supply chain as a whole.
      PubDate: Thu, 28 Sep 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx093
      Issue No: Vol. 61, No. 4 (2017)
  • Secure Top-k Preference Query for Location-based Services in
           Crowd-outsourcing Environments
    • Authors: Wu H; Wang L, Jiang S, et al.
      Pages: 496 - 511
      Abstract: AbstractThis paper considers a practical crowd-outsourcing system model for location-based services which has become increasingly popular due to the rapid proliferation of location-aware mobile devices. In our system, multiple data owners (DOs) outsource their small number of points of interests (POIs) to the location-based service provider (LBSP), then LBSP manages these POIs datasets and allows users to share information and perform top-k queries according to their own preferences. One crucial problem in this system is how to deal with the untrusted LBSP, who may return fake or incorrect query results to users for certain motives. However, the traditional top-k query and verification schemes, where only an individual DO and a single query attribute are considered, cannot be efficiently applied to our system, as users have distinct query preferences and the query may involve multiple DOs. In this paper, we design a dominant authentication graph DAUG) to process the multi-attribute data on multiple datasets efficiently, and two schemes are proposed for users to verify the integrity of the query result based on DAUG. Finally, theoretical analysis and simulation results show our superiority to the previous scheme in terms of effectiveness and efficiency.
      PubDate: Fri, 13 Oct 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx095
      Issue No: Vol. 61, No. 4 (2017)
  • Criteria-Based Encryption
    • Authors: Phuong T; Yang G, Susilo W, et al.
      Pages: 512 - 525
      Abstract: AbstractWe present a new type of public-key encryption called Criteria-based Encryption (or CE, for short). Different from Attribute-based Encryption, in CE, we consider the access policies as criteria carrying different weights. A user must hold some cases (or answers) satisfying the criteria and have sufficient weights in order to successfully decrypt a message. We then propose two CE Schemes under different settings: the first scheme requires a user to have at least one case for a criterion specified by the encryptor in the access structure, while the second scheme requires a user to have all the cases for each criterion. We prove that both schemes are secure under the Decisional q-Bilinear Diffie Hellman Exponent assumption without random oracles. In addition, we also present two special CE schemes for the above two settings without considering the weight requirement. We show that under this special case CE schemes can be constructed much more efficiently.
      PubDate: Wed, 25 Oct 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx088
      Issue No: Vol. 61, No. 4 (2017)
  • An Ensemble Method based on Selection Using Bat Algorithm for Intrusion
    • Authors: Shen Y; Zheng K, Wu C, et al.
      Pages: 526 - 538
      Abstract: AbstractMachine learning plays an important role in constructing intrusion detection models. However, the information era is an era of data. With the continuous increase in data size and the growth of data dimensions, the ability of a single classifier is becoming limited in predicting samples. In this paper, we present an ensemble method using random subspace in which an extreme learning machine (ELM) is chosen as the base classifier. To optimize the ensemble model, an ensemble pruning method based on the bat algorithm (BA) is proposed. Meanwhile, a fitness function based on the accuracy and diversity of an ensemble is defined in the BA to obtain an improved classifier subset. Three public datasets, the KDD99, NSL and Kyoto datasets, are adopted to assess the robustness of the method. The empirical results indicate that the ensemble method based on random subspace can improve the accuracy and robustness over the use of an individual ELM. The results also show that compared with when all the sub-classifiers are used in the ensemble, the pruning framework can not only achieve comparable or better performance but also save substantial computing resources in an intrusion detection system (IDS).
      PubDate: Tue, 31 Oct 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx101
      Issue No: Vol. 61, No. 4 (2017)
  • Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme
    • Authors: Lin X; Sun L, Qu H, et al.
      Pages: 539 - 544
      Abstract: AbstractCertificateless signcryption (CLSC) has attracted much attention from the research community since it provides both confidentiality and unforgeability, and, at the same time, it does not suffer from the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. However, most CLSC schemes are based on the bilinear pairing which is still a time-costing operation although many efforts have been made to improve its efficiency. Recently, Yu et al. proposed a pairing-free CLSC scheme and proved its security. In this paper, we point out that their scheme can be totally broken since confidentiality and unforgeability actually are not captured.
      PubDate: Thu, 09 Nov 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx104
      Issue No: Vol. 61, No. 4 (2017)
  • Efficient Ring Signature and Group Signature Schemes Based on q-ary
           Identification Protocols
    • Authors: Chen S; Zeng P, Choo K, et al.
      Pages: 545 - 560
      Abstract: AbstractWhile designing ring signature and group signature is a relatively mature area, few published schemes are both efficient and quantum attack-resilience. In this paper, we present two new signature schemes based on coding theory. First, we present two new zero-knowledge (ZK) identification protocols based on the construction of (Cayrel, P.L., Véron, P. and Alaoui, S.M.E.Y. (2010) A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. Proceedings of SAC 2010, Waterloo, Ontario, Canada, August 12–13, pp. 171–186. Springer, Berlin) in order to improve efficiency of code-based digital signature schemes. We then transform the newly proposed ZK protocols into a ring signature scheme and a group signature scheme. Our schemes enjoy a significant improvement in efficiency since reducing the cheating probability decreases the interaction rounds. Specially, with the security level of 2−87, the sizes of public key and signature are 14.5 KB and 52 KB in our ring signature scheme, while the corresponding sizes are 400 KB and 2384 KB in the scheme of (Cayrel, P. L., Alaoui, S. M. E. Y., Hoffmann, G. and Véron, P. (2012) An improved threshold ring signature scheme based on error correcting codes. Proceedings of WAIFI 2012, Bochum, Germany, July 16–19, pp. 45–63. Springer, Berlin). At the security level of 2−80, the sizes of public key and signature are 32 KB and 113.8 KB in our group signature scheme, as compared with 2.5 MB and 20 MB in the scheme of (Alamélou, Q., Blazy, O., Cauchie, S. and Gaborit, P. (2017) A codebased group signature scheme. Des. Codes Cryptogr., 82, 469–493) and 642 KB and 114 KB in the scheme of (Ezerman, M.F., Lee, H.T., Ling, S., Nguyen, K. and Wang, H. (2015) A provably secure group signature scheme from code-based assumptions. Proc. ASIACRYPT 2015, Auckland, New Zealand, November 29–December 3, pp. 260–285. Springer, Berlin).
      PubDate: Fri, 24 Nov 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx112
      Issue No: Vol. 61, No. 4 (2017)
  • Novel Smooth Hash Proof Systems Based on Lattices
    • Authors: Lai Q; Yang B, Yu Y, et al.
      Pages: 561 - 574
      Abstract: AbstractAs a basic and important primitive, hash proof system can be used to construct many cryptographic schemes and protocols. Therefore, it is significant to instantiate more efficient hash proof systems from various assumptions. Although there are many hash proof systems based on various classical assumptions, only a handful of efficient hash proof systems are known based on post-quantum assumptions. In this paper, we present several new hash proof systems based on the standard learning with errors (LWE) problem, which is at least as hard as standard worst-case lattice problems. Comparing with other existing constructions based on lattices, our main advantages are 2-fold: much simpler and more efficient. And our constructions can be easily extended to be identity-based ones and updatable ones. Throughout the paper, our main idea is to base hash proof systems on a new subset indistinguishability problem related to LWE, and employ the property of smooth parameter of q-ary orthogonal lattices to ensure smoothness.
      PubDate: Mon, 11 Dec 2017 00:00:00 GMT
      DOI: 10.1093/comjnl/bxx111
      Issue No: Vol. 61, No. 4 (2017)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-