Trading Privacy in the Cloud: A Fairer Way to Share Private Information
暂无分享,去创建一个
[1] Yun Ling,et al. Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.
[2] A. Juels,et al. Universal Re-encryption for Mixnets , 2004, CT-RSA.
[3] Tal Malkin,et al. Private search in the real world , 2011, ACSAC '11.
[4] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[5] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[6] E. Hughes. A cypherpunk's manifesto , 1997 .
[7] Raphael C.-W. Phan,et al. Proxy Re-encryption with Keyword Search: New Definitions and Algorithms , 2010, FGIT-SecTech/DRBC.
[8] Agusti Solanas,et al. Privacy as a Product: A case study in the m-Health sector , 2013, IISA 2013.
[9] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[10] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[11] Willy Susilo,et al. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search , 2012, Theor. Comput. Sci..
[12] Jun Shao,et al. Anonymous ID-Based Proxy Re-Encryption , 2012, ACISP.
[13] Z. Zhi-qi. Strategy and Action for Cloud Computing of the European Union:Unleashing the Potential of Cloud Computing in Europe , 2013 .
[14] Xu An Wang,et al. Further observation on proxy re-encryption with keyword search , 2012, J. Syst. Softw..
[15] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.