Cloud Security and Privacy by Design
暂无分享,去创建一个
[1] Erik Wästlund,et al. Evoking Comprehensive Mental Models of Anonymous Credentials , 2011, iNetSeC.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[4] Christian Hanser,et al. PRISMACLOUD D4.4: Overview of Functional and Malleable Signature Schemes , 2015 .
[5] Christian Hanser,et al. On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[6] Andrew J. Blumberg,et al. Verifying computations without reexecuting them , 2015, Commun. ACM.
[7] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[8] Thomas Groß,et al. Signatures and Efficient Proofs on Committed Graphs and NP-Statements , 2015, Financial Cryptography.
[9] Daniel Slamanig,et al. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[10] Solange Ghernaouti-Hélie,et al. Cyber Power: Crime, Conflict and Security in Cyberspace , 2013 .
[11] Jörn Müller-Quade,et al. Long-Term Security and Universal Composability , 2007, Journal of Cryptology.
[12] Mor Weiss,et al. Practical Solutions For Format-Preserving Encryption , 2015, ArXiv.
[13] Jan Camenisch,et al. Electronic Identities Need Private Credentials , 2012, IEEE Security & Privacy.
[14] Dario Catalano,et al. Homomorphic Signatures and Message Authentication Codes , 2014, SCN.