EECDH to prevent MITM attack in cloud computing
暂无分享,去创建一个
[1] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[2] William Stallings,et al. Cryptography and network security , 1998 .
[3] Yun Li,et al. Joint Optimization of Radio and Virtual Machine Resources With Uncertain User Demands in Mobile Cloud Computing , 2018, IEEE Transactions on Multimedia.
[4] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[5] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[8] Gail-Joon Ahn,et al. Towards temporal access control in cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.
[9] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[10] Yuqing Zhang,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[12] Larry A. Dunning,et al. Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.
[13] Slawomir Grzonkowski,et al. Sharing cloud services: user authentication for social enhancement of home networking , 2011, IEEE Transactions on Consumer Electronics.
[14] P. Varalakshmi,et al. SMOADS - Secured Multi-Owner Attribute-based Data Sharing in cloud computing , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).
[15] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[17] Avishai Wool,et al. Toward securing untrusted storage without public-key operations , 2005, StorageSS '05.
[18] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[19] Ernesto Damiani,et al. Toward Cloud-Based Key Management for Outsourced Databases , 2010, COMPSAC Workshops.
[20] Huaqun Wang,et al. Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.
[21] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[22] Radu Sion,et al. On securing untrusted clouds with cryptography , 2010, WPES '10.
[23] Jiawei Han,et al. A Distributed Game Methodology for Crowdsensing in Uncertain Wireless Scenario , 2020, IEEE Transactions on Mobile Computing.
[24] P. Varalakshmi,et al. A novel dual authentication protocol (DAP) for multi-owners in cloud computing , 2017, Cluster Computing.
[25] Wei Cao,et al. Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework , 2019, IEEE Communications Magazine.
[26] Satish Muppidi,et al. Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .
[27] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[28] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[29] Shucheng Yu,et al. Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification , 2015, IEEE Trans. Inf. Forensics Secur..
[30] M. Anwar Hasan,et al. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.
[31] Ki-Woong Park,et al. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment , 2013, IEEE Transactions on Services Computing.