Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud
暂无分享,去创建一个
[1] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[2] R. Subramanian,et al. Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).
[3] Muhammad Mohsin Nazir,et al. Security Framework for Cloud Computing Environment: A Review , 2012 .
[4] Myong H. Kang,et al. Application Lockbox for Mobile Device Security , 2011, 2011 Eighth International Conference on Information Technology: New Generations.
[5] Ming-Yen Lin,et al. Secure cloud storage for convenient data archive of smart phones , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[6] Qin Liu,et al. Efficient Sharing of Secure Cloud Storage Services , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[7] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[8] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[9] Filip De Turck,et al. Remote Display Solutions for Mobile Cloud Computing , 2011, Computer.
[10] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[11] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[12] Shahryar Shafique Qureshi,et al. Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[13] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[14] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[15] Venkata Sravan Kumar Maddineni,et al. Security Techniques for protecting data in Cloud Computing , 2012 .
[16] Rajan Mishra,et al. Comparative Analysis Of Encryption Algorithms For Data Communication , 2011 .
[17] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[18] Chia-Mu Yu,et al. XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data , 2016, IACR Cryptol. ePrint Arch..
[19] Sasu Tarkoma,et al. Mobile search and the cloud: The benefits of offloading , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[20] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).
[21] Wei Ren,et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .
[22] Ali Chehab,et al. Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.
[23] Xinwen Zhang,et al. Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.