Hierarchical group key management for secure data sharing in a cloud‐based environment
暂无分享,去创建一个
[1] V. Vaidehi,et al. Secure Group Key Management Scheme for Multicast Networks , 2010, Int. J. Netw. Secur..
[2] Jian Liu,et al. Reliable and confidential cloud storage with efficient data forwarding functionality , 2016, IET Commun..
[3] Shaozhang Niu,et al. An Effective and Secure Access Control System Scheme in the Cloud , 2015 .
[4] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[5] Chanboon Sathitwiriyawong,et al. High-availability decentralized cryptographic multi-agent key recovery , 2014, Int. Arab J. Inf. Technol..
[6] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Muhammad Torabi Dashti,et al. A Hybrid PKI-IBC Based Ephemerizer System , 2007, SEC.
[8] Mustaque Ahamad,et al. Multicast communication in distributed systems , 1990 .
[9] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[10] Guy Leduc,et al. A survey of optimal network congestion control for unicast and multicast transmission , 2006, Comput. Networks.
[11] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[12] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[13] Yacine Challal,et al. Scalable Delay-constrained Multicast Group Key Management , 2008, Int. J. Netw. Secur..
[14] Lawrence Harte. Introduction to Data Multicasting, IP Multicast Streaming for Audio and Video Media Distribution , 2008 .
[15] Heba Kamal Aslan. A scalable and distributed multicast security protocol using a subgroup-key hierarchy , 2004, Comput. Secur..
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Tao Jiang,et al. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation , 2016, IEEE Transactions on Computers.
[20] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[21] Bharat K. Bhargava,et al. Secure and efficient access to outsourced data , 2009, CCSW '09.
[22] Xinwen Zhang,et al. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.
[23] Jiannong Cao,et al. Scalable key management for secure multicast communication in the mobile environment , 2006, Pervasive Mob. Comput..
[24] Elisa Bertino,et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.
[25] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[26] Jin-Hee Cho,et al. On optimal batch rekeying for secure group communications in wireless networks , 2008, Wirel. Networks.
[27] Wei Song,et al. A practical group key management algorithm for cloud data sharing with dynamic group , 2016, China Communications.
[28] Shahaboddin Shamshirband,et al. Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.
[29] Shueng-Han Gary Chan,et al. Key management approaches to offer data confidentiality for secure multicast , 2003 .
[30] Wen-Guey Tzeng,et al. Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[31] Yu Zhou,et al. An extension of secure group communication using key graph , 2006, Inf. Sci..