A remotely keyed file encryption scheme under mobile cloud computing
暂无分享,去创建一个
Jianfeng Ma | Li Yang | Zhengan Huang | Ziyi Han | Jianfeng Ma | Li Yang | Zhengan Huang | Ziyi Han
[1] Sherali Zeadally,et al. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.
[2] Matt Blaze,et al. High-Bandwidth Encryption with Low-Bandwidth Smartcards , 1996, FSE.
[3] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[4] Diana K. Smetters,et al. Securing a remote terminal application with a mobile trusted device , 2004, 20th Annual Computer Security Applications Conference.
[5] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[6] Fatos Xhafa,et al. Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..
[7] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[8] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[9] Huaqun Wang,et al. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud , 2016, IEEE Transactions on Information Forensics and Security.
[10] Angelos D. Keromytis,et al. Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware , 2005, ICICS.
[11] Y.M.Y. Hasan. Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[12] Ali Chehab,et al. Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.
[13] Jin Li,et al. Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.
[14] Kaushik Deb,et al. User-authentication approach for data security between smartphone and cloud , 2013, Ifost.
[15] Jianfeng Ma,et al. A delegation based cross trusted domain direct anonymous attestation scheme , 2015, Comput. Networks.
[16] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[17] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[18] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[19] Joan Feigenbaum,et al. A formal treatment of remotely keyed encryption , 1998, SODA '99.
[20] Xiaofeng Chen,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.