Cloud Cryptography: Theory, Practice and Future Research Directions
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Balancing Privacy with Legitimate Surveillance and Lawful Data Access , 2015, IEEE Cloud Comput..
[2] Chun-I Fan,et al. Enabled/disabled predicate encryption in clouds , 2016, Future Gener. Comput. Syst..
[3] Joan Feigenbaum,et al. Towards a theory of data entanglement , 2007, Theor. Comput. Sci..
[4] Jiankun Hu,et al. Batch Public Key Cryptosystem with batch multi-exponentiation , 2016, Future Gener. Comput. Syst..
[5] Fangguo Zhang,et al. Memory leakage-resilient searchable symmetric encryption , 2016, Future Gener. Comput. Syst..
[6] Yongge Wang,et al. Garbled computation in cloud , 2016, Future Gener. Comput. Syst..
[7] Athanasios V. Vasilakos,et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA , 2016, Future Gener. Comput. Syst..
[8] Josep Domingo-Ferrer,et al. Privacy-preserving distributed statistical computation to a semi-honest multi-cloud , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[9] Jiankun Hu,et al. Secure searches in the cloud: A survey , 2016, Future Gener. Comput. Syst..
[10] LuRongxing,et al. Efficient and privacy-preserving skyline computation framework across domains , 2016 .
[11] Ivan Damgård,et al. Entangled cloud storage , 2016, Future Gener. Comput. Syst..
[12] Joseph K. Liu,et al. Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.
[13] Kim-Kwang Raymond Choo,et al. The cyber threat landscape: Challenges and future research directions , 2011, Comput. Secur..
[14] Josep Domingo-Ferrer,et al. Simultaneous authentication and secrecy in identity-based data upload to cloud , 2013, Cluster Computing.
[15] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[16] ZhangFangguo,et al. Memory leakage-resilient searchable symmetric encryption , 2016 .
[17] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[18] Xiaodong Lin,et al. Fine-grained data sharing in cloud computing for mobile devices , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[19] Jianfeng Ma,et al. Efficient and privacy-preserving skyline computation framework across domains , 2016, Future Gener. Comput. Syst..
[20] P. Grabosky. The Internet, Technology, and Organized Crime , 2007 .
[21] Kim-Kwang Raymond Choo,et al. Cloud based data sharing with fine-grained proxy re-encryption , 2016, Pervasive Mob. Comput..
[22] Keith M. Martin,et al. Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment , 2017, Cryptogr..
[23] Yang Lu,et al. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds , 2016, Future Gener. Comput. Syst..
[24] Jianwei Liu,et al. Identity-based proxy re-encryption version 2: Making mobile access easy in cloud , 2016, Future Gener. Comput. Syst..
[25] Kim-Kwang Raymond Choo,et al. Remote Wiping and Secure Deletion on Mobile Devices: A Review , 2016, Journal of forensic sciences.
[26] Josep Domingo-Ferrer,et al. Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..
[27] Joseph K. Liu,et al. Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing , 2016, Future Gener. Comput. Syst..
[28] Wu-Lin Chen,et al. Probability-based reversible image authentication scheme for image demosaicking , 2016, Future Gener. Comput. Syst..
[29] Sébastien Canard,et al. Highly privacy-protecting data sharing in a tree structure , 2016, Future Gener. Comput. Syst..
[30] Athanasios V. Vasilakos,et al. Two Schemes of Privacy-Preserving Trust Evaluation , 2016, Future Gener. Comput. Syst..