Elements of Cloud Storage Security

[1]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[2]  Jakob Jonsson,et al.  Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[5]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[6]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Subhash C. Kak,et al.  Online data storage using implicit security , 2009, Inf. Sci..

[8]  David F. Ferraiolo,et al.  Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .

[9]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[10]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Steven Furnell,et al.  Transparent authentication systems for mobile device security: A review , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[13]  Stephan Krenn,et al.  Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  Ramaswamy Chandramouli,et al.  NIST Special Publication 800-76-1 Biometric Data Specification for Personal Identity Verification , 2007 .

[15]  Tatiana Galibus,et al.  Cloud storage security , 2015 .

[16]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[17]  Roger Harrison,et al.  Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms , 2006, RFC.

[18]  Nikolay Shenets,et al.  Some Structural and Security Properties of the Modular Secret Sharing , 2008, 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.

[19]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.