Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[3] Jonathan Katz,et al. Improving the round complexity of VSS in point-to-point networks , 2008, Inf. Comput..
[4] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[5] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[7] Chunlin Chen,et al. Two-Level Verification of Data Integrity for Data Storage in Cloud Computing , 2011, ICEC 2011.
[8] Blair MacIntyre,et al. An Evaluation of Graphical Context as a Means for Ameliorating the Effects of Registration Error , 2009, IEEE Transactions on Visualization and Computer Graphics.
[9] Vijay Varadharajan,et al. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud , 2011, Comput. J..
[10] C. Pandu Rangan,et al. The Round Complexity of Verifiable Secret Sharing: The Statistical Case , 2010, ASIACRYPT.
[11] Jyh-haw Yeh,et al. A PASS Scheme in Cloud Computing-Protecting Data Privacy by Authentication and Secret Sharing , 2011 .
[12] Meng-Yen Hsieh,et al. Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme , 2012 .
[13] Jyh-Shyan Lin,et al. Cloud Data Storage with Group Collaboration Supports , 2011, NDT 2011.
[14] Mr. Tushar Kailas Mendhe,et al. Survey on Security, Storage, and Networking of Cloud Computing , 2012 .
[15] Katarina Stanoevska-Slabeva,et al. Grid and Cloud Computing, A Business Perspective on Technology and Applications , 2009, Grid and Cloud Computing.
[16] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[17] Yuval Ishai,et al. The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.
[18] Ivan Damgård,et al. Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.
[19] K. Srinathan,et al. Round-Optimal and Efficient Verifiable Secret Sharing , 2006, TCC.
[20] Chan Yeob Yeun,et al. New Secure Storage Architecture for Cloud Computing , 2011 .
[21] C. Pandu Rangan,et al. The Round Complexity of Verifiable Secret Sharing Revisited , 2009, CRYPTO.
[22] Kenli Li,et al. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing , 2017, IEEE Transactions on Sustainable Computing.
[23] Yinong Chen,et al. Robot as a Service in Cloud Computing , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.
[24] Chao Mei,et al. CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Ilya Mironov,et al. Publicly Verifiable Secret Sharing for Cloud-Based Key Management , 2011, INDOCRYPT.
[26] S. Jaya Nirmala,et al. A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud , 2012, CloudCom 2012.