Ensure Hierarchal Identity Based Data Security in Cloud Environment
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Masao Kasahara,et al. ID based Cryptosystems with Pairing on Elliptic Curve , 2003, IACR Cryptol. ePrint Arch..
[3] B. B. Gupta,et al. Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment , 2013, ArXiv.
[4] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[5] Giuseppe Ateniese,et al. Identity-Based Chameleon Hash and Applications , 2004, Financial Cryptography.
[6] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[7] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[8] Liqun Chen,et al. An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction , 2006, IACR Cryptol. ePrint Arch..
[9] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[10] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[11] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[12] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.
[13] Dharma P. Agrawal,et al. Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing , 2017, Multimedia Tools and Applications.
[14] Preeti Garg,et al. A Survey on Mobile Cloud Computing , 2012 .
[15] Bernd Freisleben,et al. An identity-based security infrastructure for Cloud environments , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[16] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[17] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[18] Gregory Levitin,et al. Reliability and performance of tree-structured grid services , 2006, IEEE Transactions on Reliability.
[19] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[20] Brij Bhooshan Gupta,et al. Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network , 2018, Future Gener. Comput. Syst..
[21] Tao Li,et al. Socially-conforming cooperative computation in cloud networks , 2017, J. Parallel Distributed Comput..