Key management infrastructure in cloud computing environment-a survey
暂无分享,去创建一个
[1] Young Sil Lee,et al. PKI-based cryptography for secure cloud data storage using ECC , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).
[2] R. S. Shaji,et al. Security in data forwarding through elliptic curve cryptography in cloud , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[3] Sun Lei,et al. Research on Key Management Infrastructure in Cloud Computing Environment , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.
[4] Yueyun Chen,et al. Novel hyper-combined public key based cloud storage key management scheme , 2014, China Communications.
[5] Vinod Kumar,et al. Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[6] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[7] Ivan Damgård,et al. Secure Key Management in the Cloud , 2013, IMACC.
[8] Putchong Uthayopas,et al. Performance improvement of cloud storage using a genetic algorithm based placement , 2011, 2011 Eighth International Joint Conference on Computer Science and Software Engineering (JCSSE).
[9] Ching-Nung Yang,et al. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[10] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[11] Rajashri Khanai,et al. Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[12] Xinwen Zhang,et al. Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing , 2011, CCS '11.
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] Ramaswamy Chandramouli,et al. Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.
[15] I. S. Shalini,et al. A comparative analysis of Secret Sharing Schemes with special reference to e-commerce applications , 2015, 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT).
[16] Sahil,et al. Artificial intelligence for designing user profiling system for cloud computing security: Experiment , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[17] N. Jenefa,et al. A Cloud Storage System with Data Confidentiality and Data Forwarding , 2013 .
[18] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[19] O. Pandithurai,et al. A novel method to secure cloud computing through multicast key management , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).