Improving Security Concerns of Mobile Cloud Computing Environment with Quantum Cryptographic Techniques
暂无分享,去创建一个
Sudhanshu Maurya | Kuntal Mukherjee | R. Badlishah Ahmad | R. B. Ahmad | K. Mukherjee | Dr Sudhanshu Maurya
[1] Siani Pearson,et al. Privacy, Security and Trust in Cloud Computing , 2013 .
[2] Borko Furht,et al. Handbook of Cloud Computing , 2010 .
[3] Mohamed Benmohammed,et al. Securing Encryption Key Distribution in WLAN via QKD , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[4] Wei-Tek Tsai,et al. Mobile Cloud Computing Research - Issues, Challenges and Needs , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[5] Max Mühlhäuser,et al. Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[6] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[7] Siani Pearson,et al. A Privacy Manager for Cloud Computing , 2009, CloudCom.
[8] Siddharth Dutt Choubey,et al. Study of data security and privacy preserving solutions in cloud computing , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[9] Ambika Pawar,et al. Survey on Cloud Computing Security , 2013 .
[10] Mohiuddin Ahmed,et al. An Advanced Survey on Cloud Computing and State-of-the-art Research Issues , 2012 .
[11] Pankaj Arora,et al. Cloud Computing Security Issues in Infrastructure as a Service , 2012 .
[12] Muhammad Ilyas,et al. A Literature Survey on Data Privacy/ Protection Issues and Challenges in Cloud Computing , 2012 .
[13] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[14] Sapna Malik,et al. Privacy and Security in Mobile Cloud Computing: Review , 2013 .
[15] Andrew Charlesworth,et al. Accountability as a Way Forward for Privacy Protection in the Cloud , 2009, CloudCom.
[16] D. Kahn. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .
[17] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[18] A. Falahati,et al. Using Quantum Cryptography for Securing Wireless LAN Networks , 2009, 2009 International Conference on Signal Processing Systems.
[19] Xi He,et al. Cloud Computing: a Perspective Study , 2010, New Generation Computing.
[20] Li Jun,et al. Influence of cloud computing on educational informationization of China rural areas , 2010, The 2nd International Conference on Information Science and Engineering.
[21] Darrell M. West,et al. Privacy and Security in Cloud Computing , 2010 .
[22] Kangchan Lee. Security Threats in Cloud Computing Environments 1 , 2012 .
[23] K. Popovic,et al. Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.
[24] J. Zhan,et al. Cloud Computing Security Case Studies and Research , 2013 .
[25] Bo Li,et al. Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.
[26] Abdullah Gani,et al. Tripod of Requirements in Horizontal Heterogeneous Mobile Cloud Computing , 2012, ArXiv.
[27] Charles P. Pfleeger,et al. Security in computing , 1988 .
[28] Xu Huang,et al. Quantum Cryptography for Wireless Network Communications , 2009, 2009 4th International Symposium on Wireless Pervasive Computing.
[29] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[30] E. M. Lifshitz,et al. Quantum mechanics: Non-relativistic theory, , 1959 .
[31] P. Dirac. Principles of Quantum Mechanics , 1982 .