Applications and Techniques in Information Security: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
暂无分享,去创建一个
Krishna M. Sivalingam | Gang Li | Alfredo Cuzzocrea | Simone Diniz Junqueira Barbosa | Xiaokang Yang | Junsong Yuan | Phoebe Chen | Xiaoyong Du | Orhun Kara | Ting Liu | Dominik Ślęzak | Takashi Washio | V. S. Shankar Sriram | V. Subramaniyaswamy | Leo Zhang | Lynn Batten | Junsong Yuan | T. Washio | D. Ślęzak | Simone Diniz Junqueira Barbosa | Phoebe Chen | A. Cuzzocrea | Xiaoyong Du | Orhun Kara | Ting Liu | K. Sivalingam | Xiaokang Yang | Gang Li | L. Batten | L. Zhang | V. Subramaniyaswamy | V. Sriram
[1] Laura J Armbrust,et al. PACS and image storage. , 2009, The Veterinary clinics of North America. Small animal practice.
[2] Jinjun Chen,et al. External integrity verification for outsourced big data in cloud and IoT: A big picture , 2015, Future Gener. Comput. Syst..
[3] Qing Zhou,et al. A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..
[4] Chuan-Kuei Huang,et al. Multi chaotic systems based pixel shuffle for image encryption , 2009 .
[5] Robert L. Grossman,et al. Sector and Sphere: the design and implementation of a high-performance data cloud , 2009, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[6] Mohamed Bouye,et al. New secure partial encryption method for medical images using graph coloring problem , 2015, Nonlinear Dynamics.
[7] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .
[8] Ian T. Foster,et al. Virtual workspaces: Achieving quality of service and quality of life in the Grid , 2005, Sci. Program..
[9] Vinod Patidar,et al. Medical image protection using genetic algorithm operations , 2014, Soft Computing.
[10] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[11] Xinxin Niu,et al. Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems , 2016, Int. J. Distributed Sens. Networks.
[12] Nenghai Yu,et al. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.
[13] Ian T. Foster,et al. The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[14] Wei Zhang,et al. A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..
[15] Rajat Saxena,et al. A generic approach for integrity verification of big data , 2018, Cluster Computing.
[16] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[17] Saroj Kanta Mishra,et al. Telemedicine in India: current scenario and the future. , 2009, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.
[18] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[19] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[20] Taekyoung Kwon,et al. A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage , 2015, J. Internet Serv. Inf. Secur..
[21] Varun Jeoti,et al. A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP) , 2018 .
[22] Xiaohua Jia,et al. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.
[23] Anil Kumar,et al. Extended substitution–diffusion based image cipher using chaotic standard map , 2011 .
[24] R.Santha Maria Rani,et al. Dynamic Public Data Auditing Schemes on Cloud: A Survey , 2018 .
[25] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[26] Xiaowei Yang,et al. Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).
[27] Lei Zhou,et al. Data integrity verification of the outsourced big data in the cloud environment: A survey , 2018, J. Netw. Comput. Appl..
[28] Gail-Joon Ahn,et al. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.
[29] Qian Wang,et al. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems , 2018, IEEE Transactions on Services Computing.
[30] Zhanhuai Li,et al. Study on Cloud Storage System Based on Distributed Storage Systems , 2010, 2010 International Conference on Computational and Information Sciences.
[31] Rengarajan Amirtharajan,et al. Transreceiving of encrypted medical image – a cognitive approach , 2018, Multimedia Tools and Applications.
[32] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[33] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[34] P. Poonguzhali,et al. Secured patient information transmission using reversible watermarking and DNA encrytion for medical images , 2015 .
[35] Smita Chaudhari,et al. A Comprehensive Survey on Public Auditing for Secure Cloud Storage , 2018 .
[36] W. D. Bidgood,et al. Introduction to the ACR-NEMA DICOM standard. , 1992, Radiographics : a review publication of the Radiological Society of North America, Inc.
[37] Hua Wang,et al. Improved security of a dynamic remote data possession checking protocol for cloud storage , 2014, Expert Syst. Appl..
[38] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[39] Vishakha Gupta,et al. High-Performance Hypervisor Architectures: Virtualization in HPC Systems , 2007 .
[40] Qiang Zhang,et al. Image encryption using DNA addition combining with chaotic maps , 2010, Math. Comput. Model..
[41] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[42] S. H. Krishnaveni,et al. A Study of Data Storage Security Issues in Cloud Computing , 2015 .
[43] Huaqun Wang,et al. Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.
[44] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[45] Li Xu,et al. Data dynamics for remote data possession checking in cloud storage , 2013, Comput. Electr. Eng..
[46] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[47] Geoffrey C. Fox,et al. High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.
[48] A. Alfalou,et al. Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. , 2013, Optics express.
[49] Wullianallur Raghupathi,et al. Strategic IT applications in health care , 2002, CACM.