Improving Security Concerns of Mobile Cloud Computing Environment with Quantum Cryptographic Techniques

[1]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[2]  Borko Furht,et al.  Handbook of Cloud Computing , 2010 .

[3]  Mohamed Benmohammed,et al.  Securing Encryption Key Distribution in WLAN via QKD , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[4]  Wei-Tek Tsai,et al.  Mobile Cloud Computing Research - Issues, Challenges and Needs , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[5]  Max Mühlhäuser,et al.  Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[6]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[7]  Siani Pearson,et al.  A Privacy Manager for Cloud Computing , 2009, CloudCom.

[8]  Siddharth Dutt Choubey,et al.  Study of data security and privacy preserving solutions in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[9]  Ambika Pawar,et al.  Survey on Cloud Computing Security , 2013 .

[10]  Mohiuddin Ahmed,et al.  An Advanced Survey on Cloud Computing and State-of-the-art Research Issues , 2012 .

[11]  Pankaj Arora,et al.  Cloud Computing Security Issues in Infrastructure as a Service , 2012 .

[12]  Muhammad Ilyas,et al.  A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing , 2012 .

[13]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[14]  Sapna Malik,et al.  Privacy and Security in Mobile Cloud Computing: Review , 2013 .

[15]  Andrew Charlesworth,et al.  Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.

[16]  D. Kahn The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .

[17]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[18]  A. Falahati,et al.  Using Quantum Cryptography for Securing Wireless LAN Networks , 2009, 2009 International Conference on Signal Processing Systems.

[19]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[20]  Li Jun,et al.  Influence of cloud computing on educational informationization of China rural areas , 2010, The 2nd International Conference on Information Science and Engineering.

[21]  Darrell M. West,et al.  Privacy and Security in Cloud Computing , 2010 .

[22]  Kangchan Lee Security Threats in Cloud Computing Environments 1 , 2012 .

[23]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[24]  J. Zhan,et al.  Cloud Computing Security Case Studies and Research , 2013 .

[25]  Bo Li,et al.  Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.

[26]  Abdullah Gani,et al.  Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing , 2012, ArXiv.

[27]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[28]  Xu Huang,et al.  Quantum Cryptography for Wireless Network Communications , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.

[29]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[30]  E. M. Lifshitz,et al.  Quantum mechanics: Non-relativistic theory, , 1959 .

[31]  P. Dirac Principles of Quantum Mechanics , 1982 .