메뉴 건너뛰기




Volumn 179, Issue 19, 2009, Pages 3323-3331

Online data storage using implicit security

Author keywords

Data partitioning; Implicit security architecture; Online data storage

Indexed keywords

CLOUD COMPUTING; DATA PARTITIONING; DATA RECONSTRUCTION; DATA SECURITY; FINITE FIELDS; IMPLICIT SECURITY ARCHITECTURE; INTERNET VOTING PROTOCOL; ONLINE DATA; ONLINE DATA STORAGE;

EID: 67650951127     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2009.05.013     Document Type: Article
Times cited : (73)

References (31)
  • 3
    • 67650933064 scopus 로고    scopus 로고
    • Expanding the Use of Electronic Voting Technology for UOCAVA Citizens, Department of Defence, May 2007.
    • Expanding the Use of Electronic Voting Technology for UOCAVA Citizens, Department of Defence, May 2007.
  • 7
    • 39949083022 scopus 로고    scopus 로고
    • New efficient and practical verifiable multi-secret sharing schemes
    • Dehkordi M.H., and Mashhadi S. New efficient and practical verifiable multi-secret sharing schemes. Information Sciences 178 9 (2008) 2262-2274
    • (2008) Information Sciences , vol.178 , Issue.9 , pp. 2262-2274
    • Dehkordi, M.H.1    Mashhadi, S.2
  • 10
    • 57649174953 scopus 로고    scopus 로고
    • A. Eldin, A. Ghalwash, H. ElShandidy, Enhancing packet forwarding in mobile ad hoc networks by exploiting the information dispersal algorithm, Communications, Computers and Applications, 2008. MIC-CCA 2008. Mosharaka International Conference, August 2008, pp. 20-25.
    • A. Eldin, A. Ghalwash, H. ElShandidy, Enhancing packet forwarding in mobile ad hoc networks by exploiting the information dispersal algorithm, Communications, Computers and Applications, 2008. MIC-CCA 2008. Mosharaka International Conference, August 2008, pp. 20-25.
  • 11
    • 0036053761 scopus 로고    scopus 로고
    • Choosing passwords: security and human factors
    • Gheringer E. Choosing passwords: security and human factors. Proceedings of IEEE 90 (2002) 369-373
    • (2002) Proceedings of IEEE , vol.90 , pp. 369-373
    • Gheringer, E.1
  • 17
    • 34848897043 scopus 로고
    • A new group key generating model for group sharing
    • Kuang-Hui C., and Wen-Tsuen C. A new group key generating model for group sharing. Information Sciences 64 1-2 (1992) 83-94
    • (1992) Information Sciences , vol.64 , Issue.1-2 , pp. 83-94
    • Kuang-Hui, C.1    Wen-Tsuen, C.2
  • 18
    • 0033148297 scopus 로고    scopus 로고
    • A probability model for reconstructing secret sharing under the internet environment
    • Lee C.-Y., Yeh Y.-S., Chen D.-J., and Ku K.-L. A probability model for reconstructing secret sharing under the internet environment. Information Sciences 116 2-4 (1999) 109-127
    • (1999) Information Sciences , vol.116 , Issue.2-4 , pp. 109-127
    • Lee, C.-Y.1    Yeh, Y.-S.2    Chen, D.-J.3    Ku, K.-L.4
  • 20
    • 57849120125 scopus 로고    scopus 로고
    • A. Parakh, S. Kak, Internet voting protocol based on implicit data security, in: Proceedings of 17th International Conference on Computer Communications and Networks 2008, ICCN 08, pp. 1-4.
    • A. Parakh, S. Kak, Internet voting protocol based on implicit data security, in: Proceedings of 17th International Conference on Computer Communications and Networks 2008, ICCN 08, pp. 1-4.
  • 21
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: influence of proactive password restrictions
    • Proctor R., Lien M., Vu K., and Salvendy G. Improving computer security for authentication of users: influence of proactive password restrictions. Behavior Research Methods, Instruments and Computers 34 (2002) 163-169
    • (2002) Behavior Research Methods, Instruments and Computers , vol.34 , pp. 163-169
    • Proctor, R.1    Lien, M.2    Vu, K.3    Salvendy, G.4
  • 23
    • 67650970911 scopus 로고    scopus 로고
    • S. Riley, Password security: what users know and what they actually do, Usability News 8.1 (2006).
    • S. Riley, Password security: what users know and what they actually do, Usability News 8.1 (2006).
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communication of ACM 22 11 (1979) 612-613
    • (1979) Communication of ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 27
    • 35648972648 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • December
    • Subramanian N., Yang C., and Zhang W. Securing distributed data storage and retrieval in sensor networks. Pervasive and Mobile Computing 3 6 (2007) 659-676 December
    • (2007) Pervasive and Mobile Computing , vol.3 , Issue.6 , pp. 659-676
    • Subramanian, N.1    Yang, C.2    Zhang, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.