A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data
暂无分享,去创建一个
Kranthi Kumar Singamaneni | Gaurav Dhiman | Kadiyala Ramana | Byungun Yoon | Saurabh Singh | K. Ramana | Saurabh Singh | Byung-Wan Yoon | K. Singamaneni | Gaurav Dhiman
[1] E. Poovammal,et al. Linear Elliptical Curve Digital Signature (LECDS) With Blockchain Approach for Enhanced Security on Cloud Server , 2021, IEEE Access.
[2] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[3] Kranthi Kumar Singamaneni,et al. Secure key management in cloud environment using quantum cryptography , 2018, Ingénierie des Systèmes d Inf..
[4] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[5] Jia Xu,et al. Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.
[6] Shaoyong Guo,et al. Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain , 2020 .
[7] G. Niranjana,et al. Low Energy Interleaved Chaotic Secure Image Coding Scheme for Visual Sensor Networks Using Pascal’s Triangle Transform , 2021, IEEE Access.
[8] Borja Bordel,et al. Trust Provision in the Internet of Things using Transversal Blockchain Networks , 2018 .
[9] Kenli Li,et al. A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users , 2017, IEEE Transactions on Cloud Computing.
[10] Mary Subaja Christo,et al. An Efficient Data Security in Medical Report using Block Chain Technology , 2019, 2019 International Conference on Communication and Signal Processing (ICCSP).
[11] R. Sherratt,et al. Blockchain-Based Data Storage Mechanism for Industrial Internet of Things , 2020, Intelligent Automation & Soft Computing.
[12] Gaurav Dhiman,et al. A survey on applications and security issues of blockchain technology in business sectors , 2021 .
[13] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[14] E. O. Kiktenko,et al. Quantum-secured blockchain , 2017, Quantum Science and Technology.
[15] Kranthi Kumar Singamaneni,et al. IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing , 2019, Rev. d'Intelligence Artif..
[16] Moni Naor,et al. The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[17] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[18] Jian Shen,et al. Quantum Cryptography for the Future Internet and the Security Analysis , 2018, Secur. Commun. Networks.
[19] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[20] Michal Pluhacek,et al. Preliminary Study on the Randomization and Sequencing for the Chaos Embedded Heuristic , 2015, AECIA.
[21] Kranthi Kumar Singamaneni,et al. Efficient quantum cryptography technique for key distribution , 2018 .
[22] Rajit Nair,et al. An approach to minimize the energy consumption during blockchain transaction , 2020 .
[23] E. Laxmi Lydia,et al. Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data , 2020 .
[24] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[25] Natalia Kryvinska,et al. A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree. , 2021, Mathematical biosciences and engineering : MBE.
[26] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[27] Sheng Zhong,et al. IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks , 2009, IEEE Transactions on Information Technology in Biomedicine.
[28] Gilles Brassard,et al. Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.
[29] Im-Yeong Lee,et al. A Key Recovery System Based on Password-protected Secret Sharing in a Permissioned Blockchain , 2020 .
[30] Yuvaraj Natarajan,et al. Task Scheduling in cloud using ACO , 2020 .
[31] Michael K. Reiter,et al. Space-Efficient Block Storage Integrity , 2005, NDSS.
[32] Nashaat Elkhameesy,et al. Biometrics template security on cloud computing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[33] Yimin Zhao,et al. A Novel Secure Data Transmission Scheme Using Chaotic Compressed Sensing , 2018, IEEE Access.
[34] Yan Yang,et al. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing , 2018, IEEE Access.
[35] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[36] Kenli Li,et al. Profit Maximization for Cloud Brokers in Cloud Computing , 2019, IEEE Transactions on Parallel and Distributed Systems.
[37] Mohamed Hamdi,et al. A new biometric-based security framework for cloud storage , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).