A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems
暂无分享,去创建一个
[1] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[2] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[4] Marc Sánchez Artigas. Toward efficient data access privacy in the cloud , 2013, IEEE Commun. Mag..
[5] Joseph K. Liu,et al. Security Concerns in Popular Cloud Storage Services , 2013, IEEE Pervasive Computing.
[6] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.
[7] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[8] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[9] Balachandra Reddy Kandukuri,et al. Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[12] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Sagar Naik,et al. Enhancing Data Integrity and Privacy in the Cloud: An Agenda , 2013, Computer.
[15] Peter Kulchyski. and , 2015 .
[16] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[17] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[18] Hsiang-Cheh Huang,et al. Progressive Watermarking Techniques Using Genetic Algorithms , 2007 .
[19] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[20] Hui-Zhen Gu,et al. uCloud: a user-centric key management scheme for cloud data protection , 2013, IET Inf. Secur..
[21] Kanika Lakhani,et al. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[22] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Cong Wang,et al. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.