![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Period of time: 2014年2-3期
Publisher: Inderscience Publishers
Founded in: 2005
Total resources: 15
ISSN: 1741-847X
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Grid and Utility Computing,volume 4,issue 2-3
Menu
![](/images/ico/ico5.png)
Access control requirements for structured document in cloud computing
By Yao Zhiqiang,Xiong Jinbo,Ma Jianfeng,Li Qi,Liu Ximeng in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
![](/images/ico/ico5.png)
Secure and efficient design of software block cipher implementations on microcontrollers
By Barenghi Alessandro,Pelosi Gerardo,Terraneo Federico in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
By Khan Wazir Zada,Saad Mohamad Naufal bin Mohamad,Aalsalem Mohammed Y. in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
Fairness analysis of e-commerce protocols based on strand spaces
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
A novel vulnerability detection method for ZigBee MAC layer
By Peng Siwei,Cui Baojiang,Jia Ru,Liang Shurui,Zhang Yiying in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
Privacy-preserving logistic regression outsourcing in cloud computing
By Zhu Xu Dong,Li Hui,Li Feng Hua in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
An efficient attribute-based signature scheme with claim-predicate mechanism
By Wang Changji,Li Wentao in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
Fine-grained access control for cloud computing
By Ye Xinfeng,Khoussainov Bakh in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.![](/images/ico/ico5.png)
Anti-cropping digital image watermarking using Sudoku
By Khalid Shamsul Kamal Ahmad,Deris Mustafa Mat,Mohamad Kamaruddin Malik in (2013)
International Journal of Grid and Utility Computing,volume 4,issue 2-3 , Vol. 4, Iss. 2-3, 2013-09 , pp.