Attribute-Based Collusion Resistance in Group-Based Cloud Data Sharing using LKH Model
暂无分享,去创建一个
[1] Daniar Heri Kurniawan,et al. Double Chaining Algorithm: A secure symmetric-key encryption algorithm , 2016, 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA).
[2] Duncan S. Wong,et al. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks , 2014, Int. J. Distributed Sens. Networks.
[3] Roberto Di Pietro,et al. A reliable key authentication schema for secure multicast communications , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[4] Chin-Chen Chang,et al. On the forward and backward secrecy of HLL group key exchange mechanism , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[5] A. A. Manjrekar,et al. Verification of multi-owner shared data with collusion resistant user revocation in cloud , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[6] Yuan Xie,et al. Thermal-aware 3D design for side-channel information leakage , 2016, 2016 IEEE 34th International Conference on Computer Design (ICCD).
[7] Jian Shen,et al. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.
[8] K. Kulothungan,et al. ECC based self-certified key management scheme for mutual authentication in Internet of Things , 2016, 2016 International Conference on Emerging Technological Trends (ICETT).
[9] Liu Liu,et al. Leveraging 3D technologies for hardware security: Opportunities and challenges , 2016, 2016 International Great Lakes Symposium on VLSI (GLSVLSI).
[10] Farkhad Ihsan Hariadi,et al. Implementation of hash function on embedded-system platform using chaotic tent map algorithm , 2016, 2016 International Symposium on Electronics and Smart Devices (ISESD).
[11] Chin-Chen Chang,et al. Secure communications for cluster-based ad hoc networks using node identities , 2007, J. Netw. Comput. Appl..
[12] Ryan Kastner,et al. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors , 2012, Cryptography and Security.
[13] Mark Mohammad Tehranipoor,et al. Security and Vulnerability Implications of 3D ICs , 2016, IEEE Transactions on Multi-Scale Computing Systems.
[14] Lu Li,et al. Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes , 2015, 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS).
[15] Qinglei Kong,et al. Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.
[16] Hiroshi Nakagawa,et al. Collusion-resistant privacy-preserving data mining , 2010, KDD.
[17] Emre Salman,et al. Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[18] Wilfred Ng,et al. Two Efficient Hashing Schemes for High-Dimensional Furthest Neighbor Search , 2017, IEEE Transactions on Knowledge and Data Engineering.
[19] Donghoon Lee,et al. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2014, Sensors.
[20] Kun Cao,et al. A survey of optimization techniques for thermal-aware 3D processors , 2019, J. Syst. Archit..
[21] Shahar Kvatinsky,et al. Towards a memristive hardware secure hash function (MemHash) , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[22] Larry A. Dunning,et al. Privacy Preserving Data Sharing With Anonymous ID Assignment , 2013, IEEE Transactions on Information Forensics and Security.
[23] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[24] Xuemin Shen,et al. Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.
[25] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[26] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[27] Wenfen Liu,et al. Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security , 2017, Int. J. Found. Comput. Sci..
[28] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[29] Renren Dong,et al. Trust Enabled Secure Multiparty Computation , 2010, 2010 14th International Conference Information Visualisation.