Chaos-based Encryption Keys and Neural Key-store for Cloud-hosted Data Confidentiality
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[2] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[3] Sean Hallgren,et al. Quantum algorithms for some hidden shift problems , 2003, SODA '03.
[4] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[5] Vasilios Zorkadis,et al. On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators , 2003, Neural Networks.
[6] Krishan Kumar,et al. A Symmetric Key Cryptographic Algorithm Using Counter Propagation Network (CPN) , 2014, ICTCS '14.
[7] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[8] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[9] Neeraj Kumar,et al. Detection of Data Leakage in Cloud Computing Environment , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Ahmed Shawish,et al. Cloud Computing: Paradigms and Technologies , 2014 .
[12] Richard J. Lipton,et al. Searching for Elements in Black Box Fields and Applications , 1996, CRYPTO 1996.
[13] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.