An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms
暂无分享,去创建一个
Abdelkader Laouid | Muath AlShaikh | Mohammed Amine Yagoub | Ahcène Bounceur | A. Bounceur | A. Laouid | M. AlShaikh
[1] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[2] Rajesh C. Dharmik,et al. Deployment of application on Cloud and enhanced data security in Cloud computing using ECC algorithm , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[3] Agostino Poggi,et al. Jade - a fipa-compliant agent framework , 1999 .
[4] William Stallings,et al. Cryptography and network security , 1998 .
[5] Nilesh N. Kumbhar,et al. The Comprehensive Approach for Data Security in Cloud Computing: A Survey , 2012 .
[6] Rosario Gennaro,et al. Paillier's cryptosystem revisited , 2001, CCS '01.
[7] Dongxi Liu,et al. Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[8] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[9] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[10] Babitha M.P.,et al. Secure cloud storage using AES encryption , 2016, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).
[11] Teng Zhang,et al. A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[12] Thomas Schwarz. Dodrant-homomorphic encryption for cloud databases using table lookup , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[13] Dongxi Liu,et al. Nonlinear order preserving index for encrypted database query in service cloud environments , 2013, Concurr. Comput. Pract. Exp..
[14] K. Govinda,et al. Agent Based Security for Cloud Computing using Obfuscation , 2012 .
[15] A. Poggi,et al. Multi-User and Security Support for Multi-Agent Systems , 2001, WOA.
[16] Joe Kilian. Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings , 2005, TCC.
[17] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[18] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[19] E. M. Mohamed,et al. Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[20] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[21] Antonio Puliafito,et al. Achieving Information Security in Network Computing Systems , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[22] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[23] Javier Herranz,et al. Additively Homomorphic Encryption with d-Operand Multiplications , 2010, IACR Cryptol. ePrint Arch..
[24] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[25] Okba Kazar,et al. An adaptive and efficient fully homomorphic encryption technique , 2018, ICFNDS.
[26] Miguel Correia,et al. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.
[27] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[28] V. Surya,et al. Secure Cloud Storage Using AES Encryption , 2018 .
[29] Sushil Jajodia,et al. Numerical SQL Value Expressions Over Encrypted Cloud Databases , 2015, DEXA.