BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
暂无分享,去创建一个
Shahaboddin Shamshirband | Miss Laiha Mat Kiah | Abdul Nasir Khan | Sajjad Ahmad Madani | Atta ur Rehman Khan | Mazhar Ali | M. L. M. Kiah | Abdul Nasir Khan | Atta ur Rehman Khan | Shahaboddin Shamshirband | S. Madani | A. R. Khan | Mazhar Ali
[1] J. Hubaux,et al. Meetings through the cloud: Privacy-preserving scheduling on mobile devices , 2011, J. Syst. Softw..
[2] Ming-Yen Lin,et al. Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[3] Piotr K. Tysowski,et al. Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds , 2011, IACR Cryptol. ePrint Arch..
[4] Abdul Nasir Khan,et al. Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing , 2009, Inf. Secur. J. A Glob. Perspect..
[5] Wei Ren,et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .
[6] Seyyed MohsenHashemi,et al. Taxonomy of the Security Aspects of Cloud Computing Systems - A Survey , 2012 .
[7] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[8] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[9] Dijiang Huang,et al. MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication , 2010, 2010 Fifth IEEE International Symposium on Service Oriented System Engineering.
[10] Dong Hoon Lee,et al. Key Establishment Scheme for Sensor Networks with Low Communication Cost , 2007, ATC.
[11] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Ali Chehab,et al. Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.
[13] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.
[14] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[15] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[16] Li-Chun Wang,et al. A Security Framework of Group Location-Based Mobile Applications in Cloud Computing , 2011, 2011 40th International Conference on Parallel Processing Workshops.
[17] Nikolaj Bjørner,et al. Satisfiability Modulo Theories: An Appetizer , 2009, SBMF.
[18] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[19] Shahaboddin Shamshirband,et al. Incremental proxy re-encryption scheme for mobile cloud computing environment , 2013, The Journal of Supercomputing.
[20] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[21] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[22] Weibo Gong,et al. Mobility Can Help: Protect User Identity with Dynamic Credential , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[23] Zhenfu Cao,et al. CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..
[24] Miss Laiha Mat Kiah,et al. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.
[25] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[26] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[27] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[28] Abdul Nasir Khan,et al. An intelligent approach of sniffer detection , 2012, Int. Arab J. Inf. Technol..
[29] Xiaodong Lin,et al. SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[30] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[31] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[32] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.