An Efficient Authentication Scheme to Protect User Privacy in Seamless Big Data Services
暂无分享,去创建一个
[1] Hiroshi Ishii,et al. An enhanced framework for providing multimedia broadcast/multicast service over heterogeneous networks , 2014, Journal of Zhejiang University SCIENCE C.
[2] Xindong Wu,et al. Data mining with big data , 2014, IEEE Transactions on Knowledge and Data Engineering.
[3] Avita Katal,et al. Big data: Issues, challenges, tools and Good practices , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[4] Zibin Zheng,et al. Service-Generated Big Data and Big Data-as-a-Service: An Overview , 2013, 2013 IEEE International Congress on Big Data.
[5] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[6] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[7] Keith W. Miller,et al. Big Data: New Opportunities and New Challenges [Guest editors' introduction] , 2013, Computer.
[8] Weigang Li,et al. Querying dynamic communities in online social networks , 2014, Journal of Zhejiang University SCIENCE C.
[9] Hai Jin,et al. Building a network highway for big data: architecture and challenges , 2014, IEEE Network.
[10] B. Priyadharshini,et al. Data integrity in cloud storage , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[11] Kyong-Ha Lee,et al. Massive Data Processing and Management in Cloud Computing: A Survey , 2011 .
[12] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[13] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Josep Domingo-Ferrer,et al. Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.
[15] Jun Ma,et al. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage , 2013, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).