Revocable-Storage Identity-Based Encryption: Secure Data Sharing In Cloud
暂无分享,去创建一个
Renuka | P Bharathi | R Saranya | Sonia Jenifer Rayen | B. P | Renuka V | Saranya R
[1] Sushmita Ruj,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Leonid Reyzin,et al. A New Forward-Secure Digital Signature Scheme , 2000, ASIACRYPT.
[3] Prakash Mohan,et al. An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password , 2017, Int. J. Inf. Secur. Priv..
[4] Ravichandran Thangavel,et al. Resource Selection in Grid Environment Based on Trust Evaluation Using Feedback and Performance , 2013 .
[5] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[6] Raja Rajeswari Ch,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[7] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[8] Gary Anthes,et al. Security in the cloud , 2010, Commun. ACM.
[9] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[10] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[11] B. Sathyabama,et al. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds , 2019 .
[12] Li Xu,et al. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security , 2015, IEEE Transactions on Computers.
[13] Sang-Uk Shin,et al. Certificate-Based Proxy Re-encryption for Public Cloud Storage , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[14] Dongdong Sun,et al. Forward-Secure Hierarchical Predicate Encryption , 2012, Pairing.
[15] M. Prakash,et al. Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature , 2015 .
[16] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[17] David Pointcheval,et al. Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts , 2012, International Journal of Information Security.
[18] Joseph K. Liu,et al. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.