Elements of Cloud Storage Security
暂无分享,去创建一个
Edison Pignaton de Freitas | Robson de Oliveira Albuquerque | Tatiana Galibus | Viktor Krasnoproshin | E. P. Freitas | V. Krasnoproshin | Tatiana Galibus | R. D. O. Albuquerque
[1] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[2] Jakob Jonsson,et al. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[5] V. K. Agrawal,et al. Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.
[6] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Subhash C. Kak,et al. Online data storage using implicit security , 2009, Inf. Sci..
[8] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[9] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Steven Furnell,et al. Transparent authentication systems for mobile device security: A review , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[13] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Ramaswamy Chandramouli,et al. NIST Special Publication 800-76-1 Biometric Data Specification for Personal Identity Verification , 2007 .
[15] Tatiana Galibus,et al. Cloud storage security , 2015 .
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Roger Harrison,et al. Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms , 2006, RFC.
[18] Nikolay Shenets,et al. Some Structural and Security Properties of the Modular Secret Sharing , 2008, 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.
[19] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.