IT-Sicherheit und Cloud Computing
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Sylvia Osborn,et al. Role-based security: pros, cons, & some research directions , 1993, SGSC.
[3] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[5] Kihyun Kim,et al. Public Key Encryption with Conjunctive Field Keyword Search , 2004, WISA.
[6] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[7] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[8] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[9] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[10] Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, EUROCRYPT.
[11] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[12] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[13] Ari Juels,et al. Proofs of retrievability: theory and implementation , 2009, CCSW '09.
[14] Georg Sigl,et al. Physical Unclonable Functions , 2012, Datenschutz und Datensicherheit - DuD.
[15] Eric Chien,et al. W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.
[16] Marten van Dijk,et al. Iris: a scalable cloud file system with efficient integrity checks , 2012, ACSAC '12.
[17] Claudia Eckert,et al. Active File Integrity Monitoring Using Paravirtualized Filesystems , 2013, INTRUST.
[18] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.
[19] Christoph Krauß,et al. Using Trusted Platform Modules for Location Assurance in Cloud Networking , 2013, NSS.
[20] Claudia Eckert,et al. Improving Mobile Device Security with Operating System-Level Virtualization , 2013, SEC.
[21] Christoph Krauß,et al. Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks , 2013, ISC.