Elliptic Curve Cryptography for Securing Cloud Computing Applications
暂无分享,去创建一个
[1] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[2] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[3] Timothy W. Finin,et al. Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.
[4] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[5] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[6] A. Zahariev. Google App Engine , 2009 .
[7] Rajkumar Buyya,et al. GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..
[8] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[9] Randhir Kumar,et al. Implementation of Elliptical Curve Cryptography , 2011 .
[10] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[11] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[12] Ian T. Foster,et al. GangSim: a simulator for grid scheduling studies , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[13] Rusli Abdullah,et al. Formulating a security layer of cloud data storage framework based on multi agent system architecture. , 2010 .
[14] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[15] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[16] Bo Peng,et al. Implementation Issues of A Cloud Computing Platform , 2009, IEEE Data Eng. Bull..
[17] F. John Krautheim,et al. Private Virtual Infrastructure for Cloud Computing , 2009, HotCloud.
[18] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[19] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[20] Wolfgang Bauer. Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.
[21] Aladdin Ayesh,et al. Framework of multi-agents internet security system , 2000 .
[22] Pedro A. C. Sousa,et al. Dealing with Security within the DEEPSIA Project , 2002 .
[23] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[24] Muhammad Yasir Malik. Efficient implementation of Elliptic Curve Cryptography using low-power Digital Signal Processor , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[25] D. O'Mahony,et al. Electronic payment systems for e-commerce , 2001 .
[26] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[27] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[28] Henri Casanova,et al. Scheduling distributed applications: the SimGrid simulation framework , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..
[29] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[30] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[31] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.