


default search action
International Journal of Foundations of Computer Science, Volume 28
Volume 28, Number 1, January 2017
- Guangkui Xu

, Xiwang Cao, Shanding Xu:
Several Classes of Quadratic Ternary Bent, Near-Bent and 2-Plateaued Functions. 1-18 - Rongjia Li

, Chenhui Jin
:
Meet-in-the-Middle Attack on 11-Round 3D Block Cipher. 19-28 - Vecdi Aytaç, Zeynep Nihan Berberler:

Binding Number and Wheel Related Graphs. 29-38 - Frank Gurski

, Patrick Gwydion Poullie:
Interval Routing Schemes for Circular-Arc Graphs. 39-60 - Dongfang Zhou, Jianxi Fan, Cheng-Kuan Lin, Jingya Zhou

, Xi Wang:
Cycles Embedding in Exchanged Crossed Cube. 61-76 - Samir Elouasbi

, Andrzej Pelc:
Deterministic Rendezvous with Detection Using Beeps. 77-
Volume 28, Number 2, February 2017
- Xiang Wang, Fang-Wei Fu:

Deterministic Construction of Compressed Sensing Matrices from Codes. 99-110 - Quentin Bramas

, Sébastien Tixeuil:
The Random Bit Complexity of Mobile Robots Scattering. 111-134 - Michael Coons

:
Regular Sequences and the Joint Spectral Radius. 135-140 - George Lagogiannis:

Query-Optimal Partially Persistent B-Trees with Constant Worst-Case Update Time. 141-170 - Zuling Chang, Pinhui Ke, Yongcheng Zhao:

Some Enumeration Results on Binary 2n-Periodic Sequences. 171-184 - Stefan Arnold:

Identifying Generalized Reed-Muller Codewords by Quantum Queries. 185-
Volume 28, Number 3, April 2017
- Alexandros Palioudakis

, Kai Salomaa, Selim G. Akl:
Worst Case Branching and Other Measures of Nondeterminism. 195-210 - Jing Li, Yuxing Yang

, Xiaohui Gao:
Hamiltonicity of the Torus Network Under the Conditional Fault Model. 211-228 - Markus Holzer

, Sebastian Jakobi:
More on Minimizing Finite Automata with Errors - Nondeterministic Machines. 229-246 - Wen Chean Teh

, Adrian Atanasiu
:
Minimal Reaction Systems Revisited and Reaction System Rank. 247-262 - Jean Mairesse, Irène Marcovici:

Uniform Sampling of Subshifts of Finite Type on Grids and Trees. 263-288 - Meng Zhang

:
Fast Convolutions of Packed Strings and Pattern Matching with Wildcards. 289-
Volume 28, Number 4, June 2017
- Zahra Moslehi, Alireza Bagheri

:
Separating Bichromatic Point Sets by Minimal Triangles with a Fixed Angle. 309-320 - Benjamin Russell, Susan Stepney

:
The Geometry of Speed Limiting Resources in Physical Models of Computation. 321-334 - Goksen Bacak-Turan

, Ekrem Oz
:
Neighbor Rupture Degree of Transformation Graphs Gxy-. 335-356 - Zhiqiang Sun

, Lei Hu:
Several Classes of Boolean Functions with Four-Valued Walsh Spectra. 357-378 - Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain

:
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions. 379-390 - Pinhui Ke, Zhifan Ye, Zhengchun Zhou, Jian Shen

:
Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence. 391-410 - Rachid Hadid, Mehmet Hakan Karaata, Vincent Villain:

A Stabilizing Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Networks. 411-
Volume 28, Number 5, August 2017
- Yo-Sub Han, Kai Salomaa:

Preface. 437-440 - Zoltán Fülöp:

In Memoriam Zoltán Ésik (1951-2016). 441-444 - Christos A. Kapoutsis

, Lamana Mulaffer:
A Logical Characterization of Small 2NFAs. 445-464 - Shinnosuke Seki, Andrew Winslow:

The Complexity of Fixed-Height Patterned Tile Self-Assembly. 465-482 - Aleksandrs Belovs

, J. Andres Montoya
, Abuzer Yakaryilmaz
:
On a Conjecture by Christian Choffrut. 483-502 - Holger Bock Axelsen, Markus Holzer

, Martin Kutrib
:
The Degree of Irreversibility in Deterministic Finite Automata. 503-522 - Markus Teichmann:

Regular Approximation of Weighted Linear Context-Free Tree Languages. 523-542 - Martin Sulzmann, Kenny Zhuo Ming Lu:

Derivative-Based Diagnosis of Regular Expression Ambiguity. 543-562 - Akio Fujiyoshi:

A Practical Algorithm for the Uniform Membership Problem of Labeled Multidigraphs of Tree-Width 2 for Spanning Tree Automata. 563-582 - Suna Bensch

, Johanna Björklund, Martin Kutrib
:
Deterministic Stack Transducers. 583-602 - Jorge Calvo-Zaragoza

, José Oncina
, Colin de la Higuera
:
Computing the Expected Edit Distance from a String to a Probabilistic Finite-State Automaton. 603-622 - Daniel Prusa:

Complexity of Matching Sets of Two-Dimensional Patterns by Two-Dimensional On-Line Tessellation Automaton. 623-
Volume 28, Number 6, September 2017
- Jinguang Han

, Yogachandran Rahulamathavan
, Willy Susilo
:
Preface. 641-644 - Chunguang Ma, Juyan Li

, Weiping Ouyang:
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment. 645-660 - Rashed Mazumder, Atsuko Miyaji

, Chunhua Su:
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data. 661-682 - Youwen Zhu, Xingxin Li, Jian Wang, Yining Liu, Zhiguo Qu:

Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud. 683-704 - Gang Yu, Xiaoxiao Ma, Zhenfu Cao

, Guang Zeng, Wenbao Han:
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud. 705-724 - Yangguang Tian, Guomin Yang

, Yi Mu, Shiwei Zhang, Kaitai Liang
, Yong Yu
:
One-Round Attribute-Based Key Exchange in the Multi-Party Setting. 725-742 - Fucai Zhou, Su Peng, Jian Xu

, Zifeng Xu:
Identity-Based Batch Provable Data Possession with Detailed Analyses. 743-760 - Jianye Huang, Qiong Huang, Chunhua Pan:

A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. 761-780 - Chin-Ling Chen, Jungpil Shin, Yu-Ting Tsai, Aniello Castiglione

, Francesco Palmieri:
Securing Information Exchange in VANETs by Using Pairing-Based Cryptography. 781-798 - Jiameng Sun, Binrui Zhu, Jing Qin, Jiankun Hu

, Qianhong Wu:
Confidentiality-Preserving Publicly Verifiable Computation. 799-818
Volume 28, Number 7, November 2017
- Lei Sun, Fang-Wei Fu, Jian Liu

:
On the Conjecture About the Linear Structures of Rotation Symmetric Boolean Functions. 819-834 - Aysun Aytaç, Zeynep Nihan Berberler:

Robustness of Regular Caterpillars. 835-842 - Jianghong Wei

, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. 843-868 - Gokarna Sharma

, Costas Busch:
The Bursty Steiner Tree Problem. 869-888 - Jie Lin, Yue Jiang, E. James Harner, Bing-Hua Jiang

, Don Adjeroh:
IDPM: An Improved Degenerate Pattern Matching Algorithm for Biological Sequences. 889-914 - Lili Guo, Xi Wang, Cheng-Kuan Lin, Jingya Zhou, Jianxi Fan:

A Fault-Free Unicast Algorithm in the Generalized Hypercube with Restricted Faulty Vertices. 915-930 - Vaishali Mehta Wadhwa

, Deepak Garg
:
Approximation Algorithm for Resource Allocation Problems with Time Dependent Penalties. 931-944
Volume 28, Number 8, December 2017
- Mohamed Faouzi Atig, Benedikt Bollig, Peter Habermehl:

Emptiness of Ordered Multi-Pushdown Automata is 2ETIME-Complete. 945-976 - Wenyi Hong, Zhenbo Wang:

Improved Approximation Algorithm for the Combination of Parallel Machine Scheduling and Vertex Cover. 977-992 - Yinkui Li, Mingzhe Du, Hongyan Li, Xiaolin Wang:

Edge Rupture Degree of Graphs. 993-1006 - Sepinoud Azimi

, Charmi Panchal
, Andrzej Mizera, Ion Petre
:
Multi-Stability, Limit Cycles, and Period-Doubling Bifurcation with Reaction Systems. 1007-1020 - Joel Antonio Trejo-Sánchez, José Alberto Fernández-Zepeda, Julio Cesar Ramírez Pacheco

:
A Self-Stabilizing Algorithm for a Maximal 2-Packing in a Cactus Graph Under Any Scheduler. 1021-1046 - Pingshan Li

, Min Xu:
The Super Spanning Connectivity of Arrangement Graphs. 1047-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














