A GPU Unified Platform to Secure Big Data Transportation Using an Error-Prone Elliptic Curve Cryptography
暂无分享,去创建一个
Lukman Ab. Rahim | Shiladitya Bhattacharjee | Ade Wahyu Ramadhani | Divya Midhun Chakkaravarhty | Midhun Chakkaravarty
[1] Houbing Song,et al. Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications , 2016, IEEE Access.
[2] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[3] Jinjun Chen,et al. A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..
[4] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[5] Chin-Ling Chen,et al. A Secure Medical Data Exchange Protocol Based on Cloud Environment , 2014, Journal of Medical Systems.
[6] Yong Xiang,et al. Protection of Big Data Privacy , 2016, IEEE Access.
[7] Xiaohua Jia,et al. Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud , 2015 .
[8] Chunhua Jin,et al. Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.
[9] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[10] Vijay S. Pande,et al. Hard Data on Soft Errors: A Large-Scale Assessment of Real-World Error Rates in GPGPU , 2009, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[11] Shiladitya Bhattacharjee,et al. A multibit burst error detection and correction mechanism for application layer , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).
[12] Shiladitya Bhattacharjee,et al. A security scheme to minimize information loss during big data transmission over the internet , 2016, 2016 3rd International Conference on Computer and Information Sciences (ICCOINS).
[13] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[14] M. Shamim Hossain,et al. Secure data-exchange protocol in a cloud-based collaborative health care environment , 2018, Multimedia Tools and Applications.
[15] Lu Zhang,et al. Development and Application of a Chinese Webpage Suicide Information Mining System (Sims) , 2013, Journal of Medical Systems.
[16] Jianqiang Li,et al. A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..
[17] Xiaohong Yuan,et al. Network security analysis using Big Data technology , 2016, SoutheastCon 2016.
[18] Manish Kumar,et al. A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography , 2016, Signal Process..
[19] Shiladitya Bhattacharjee,et al. A Hybrid Technique for Enhancing Data Integrity in Big Data Transmission Environment , 2018, 2018 4th International Conference on Computer and Information Sciences (ICCOINS).
[20] Won Woo Ro,et al. Access pattern-aware cache management for improving data utilization in GPU , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[21] Min Yoon,et al. A data encryption scheme and GPU-based query processing algorithm for spatial data outsourcing , 2015, 2015 International Conference on Big Data and Smart Computing (BIGCOMP).
[22] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[23] Shiladitya Bhattacharjee,et al. GPU-Based Integrated Security System for Minimizing Data Loss in Big Data Transmission , 2019 .
[24] Shadi Aljawarneh,et al. A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.