Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
暂无分享,去创建一个
[1] Wenbin Yao,et al. Attribute-Based Signcryption From Lattices in the Standard Model , 2019, IEEE Access.
[2] Wang Yao,et al. Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing , 2018, Multimedia tools and applications.
[3] Sherali Zeadally,et al. Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems , 2018, IEEE Transactions on Industrial Informatics.
[4] Yao Zhang,et al. A survey on the development status and challenges of smart grids in main driver countries , 2017 .
[5] Baoyuan Kang,et al. Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks , 2017, Mob. Inf. Syst..
[6] Ronald Cramer,et al. Recovering Short Generators of Principal Ideals in Cyclotomic Rings , 2016, EUROCRYPT.
[7] Chris Peikert,et al. A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..
[8] Jianhong Zhang,et al. IPad: ID-based public auditing for the outsourced data in the standard model , 2016, Cluster Computing.
[9] Liang Chen,et al. A post-quantum provable data possession protocol in cloud , 2013, Secur. Commun. Networks.
[10] Wei Xu,et al. Public verifiable proof of storage protocol from lattice assumption , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.
[11] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[13] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[14] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[15] Syed Imran Jami,et al. Current Trends in Cloud Computing for Data Science Experiments , 2021, Int. J. Cloud Appl. Comput..
[16] Richard O. Sinnott,et al. Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology , 2019, IEEE Access.
[17] Dongxi Liu,et al. An Identity-Based Signcryption on Lattice without Trapdoor , 2019, J. Univers. Comput. Sci..
[18] Yang Yang,et al. Secure Cloud Storage Based on RLWE Problem , 2019, IEEE Access.
[19] Ahmad M. Manasrah,et al. An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment , 2017, Cluster Computing.
[20] Shingo Yamaguchi,et al. Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .
[21] Michael Schneider,et al. Estimating the Security of Lattice-based Cryptosystems , 2010, IACR Cryptol. ePrint Arch..