Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model

Utilizing cloud computing, users can avail a compelling and effective approach for information sharing between collective individuals in the cloud with the facility of less administration cost and ...

[1]  Daniar Heri Kurniawan,et al.  Double Chaining Algorithm: A secure symmetric-key encryption algorithm , 2016, 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA).

[2]  Duncan S. Wong,et al.  Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks , 2014, Int. J. Distributed Sens. Networks.

[3]  Roberto Di Pietro,et al.  A reliable key authentication schema for secure multicast communications , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..

[4]  Chin-Chen Chang,et al.  On the forward and backward secrecy of HLL group key exchange mechanism , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).

[5]  A. A. Manjrekar,et al.  Verification of multi-owner shared data with collusion resistant user revocation in cloud , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).

[6]  Yuan Xie,et al.  Thermal-aware 3D design for side-channel information leakage , 2016, 2016 IEEE 34th International Conference on Computer Design (ICCD).

[7]  Jian Shen,et al.  Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.

[8]  K. Kulothungan,et al.  ECC based self-certified key management scheme for mutual authentication in Internet of Things , 2016, 2016 International Conference on Emerging Technological Trends (ICETT).

[9]  Liu Liu,et al.  Leveraging 3D technologies for hardware security: Opportunities and challenges , 2016, 2016 International Great Lakes Symposium on VLSI (GLSVLSI).

[10]  Farkhad Ihsan Hariadi,et al.  Implementation of hash function on embedded-system platform using chaotic tent map algorithm , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).

[11]  Chin-Chen Chang,et al.  Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..

[12]  Ryan Kastner,et al.  A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors , 2012, Cryptography and Security.

[13]  Mark Mohammad Tehranipoor,et al.  Security and Vulnerability Implications of 3D ICs , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[14]  Lu Li,et al.  Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes , 2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS).

[15]  Qinglei Kong,et al.  Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.

[16]  Hiroshi Nakagawa,et al.  Collusion-resistant privacy-preserving data mining , 2010, KDD.

[17]  Emre Salman,et al.  Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[18]  Wilfred Ng,et al.  Two Efficient Hashing Schemes for High-Dimensional Furthest Neighbor Search , 2017, IEEE Transactions on Knowledge and Data Engineering.

[19]  Donghoon Lee,et al.  Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.

[20]  Kun Cao,et al.  A survey of optimization techniques for thermal-aware 3D processors , 2019, J. Syst. Archit..

[21]  Shahar Kvatinsky,et al.  Towards a memristive hardware secure hash function (MemHash) , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[22]  Larry A. Dunning,et al.  Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[24]  Xuemin Shen,et al.  Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.

[25]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.

[26]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[27]  Wenfen Liu,et al.  Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security , 2017, Int. J. Found. Comput. Sci..

[28]  Matthew K. Franklin,et al.  Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[29]  Renren Dong,et al.  Trust Enabled Secure Multiparty Computation , 2010, 2010 14th International Conference Information Visualisation.