Design of Security Solution to Mobile Cloud Storage
暂无分享,去创建一个
[1] Karen A. Scarfone,et al. Guidelines on Cell Phone and PDA Security , 2008 .
[2] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Qiaoyan Wen,et al. Trusted Mobile Client for Document Security in Mobile Office Automation , 2011 .
[5] Hari Balakrishnan,et al. CryptDB: A Practical Encrypted Relational DBMS , 2011 .
[6] Tsuyoshi Takagi,et al. Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings , 2007, Pairing.
[7] Ahmad-Reza Sadeghi,et al. Twin Clouds: An Architecture for Secure Cloud Computing , 2011 .
[8] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[9] Dhananjay S. Phatak,et al. Building trust into utility cloud computing , 2010 .
[10] Pil Joong Lee,et al. Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.
[11] Carlo Curino,et al. Relational Cloud: a Database Service for the cloud , 2011, CIDR.