Enhancement of data confidentiality and secure data transaction in cloud storage environment
暂无分享,去创建一个
[1] S. Udhayakumar,et al. Dynamic authentication for consumer supplies in mobile cloud environment , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[2] V. Kavitha,et al. Crypto System based Authentication using CSTA in Grid , 2012 .
[3] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[4] Young-Sik Jeong,et al. A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..
[5] Joonsang Baek,et al. A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.
[6] Wen-Chuan Wu. Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code , 2015 .
[7] Md. Alam Hossain,et al. Performance Analysis of Different Cryptography Algorithms , 2016 .
[8] M. Bala Krishna,et al. Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting , 2016, Wireless Personal Communications.
[10] Chin-Laung Lei,et al. Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.
[11] Wenting Shen,et al. Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium , 2017, J. Netw. Comput. Appl..
[12] Yue Liu,et al. Recognition of QR Code with mobile phones , 2008, 2008 Chinese Control and Decision Conference.
[13] Y. Sreenivasa Rao,et al. A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..
[14] Farrukh Shahzad,et al. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.
[15] Hyotaek Lim,et al. Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.
[16] R. Divya,et al. An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).