-
1
-
-
38149009170
-
Short signatures without random oracles and the sdh assumption in bilinear groups
-
BONEH, D., AND BOYEN, X. Short signatures without random oracles and the sdh assumption in bilinear groups. Journal of Cryptology 21, 2 (2008), 149-177.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
33749681217
-
Efficient password-based authentication and key exchange scheme preserving user privacy
-
CHAI, Z., CAO, Z., AND LU, R. Efficient password-based authentication and key exchange scheme preserving user privacy. In Lecture Notes in Computer Science, Wireless Algorithms, Systems, and Applications (2006), vol. 4138, pp. 467-477.
-
(2006)
Lecture Notes in Computer Science, Wireless Algorithms, Systems, and Applications
, vol.4138
, pp. 467-477
-
-
Chai, Z.1
Cao, Z.2
Lu, R.3
-
4
-
-
63049096381
-
Cloud computing: Does nirvana hide behind the nebula?
-
March-April
-
ERDOGMUS, H. Cloud computing: Does nirvana hide behind the nebula? IEEE Software 11, 2 (March-April 2009), 4-6.
-
(2009)
IEEE Software
, vol.11
, Issue.2
, pp. 4-6
-
-
Erdogmus, H.1
-
5
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
FOSTER, I., ZHAO, Y., RAICU, I., AND LU, S. Cloud computing and grid computing 360-degree compared. In Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008), pp. 1-10.
-
Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008)
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
6
-
-
77950567715
-
Privacy in the clouds: Risks to privacy and confidentiality from cloud computing
-
Tech. rep., February
-
GELLMAN, R. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. Tech. rep., February 2009. http://www.worldprivacyforum. org.
-
(2009)
-
-
Gellman, R.1
-
7
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
GOLDWASSER, S., MICALI, S., AND RIVEST, R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing 17, 2 (1988), 281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
HASAN, R., SION, R., AND WINSLETT, M. Introducing secure provenance: problems and challenges. In Proceedings of ACM workshop on Storage security and survivabilit, StorageSS'07 (Alexandria, Virginia, USA, October 2007), pp. 13-18.
-
Proceedings of ACM Workshop on Storage Security and Survivabilit, StorageSS'07 (Alexandria, Virginia, USA, October 2007)
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
10
-
-
70349309706
-
Data security in the world of cloud computing
-
July-Aug.
-
KAUFMAN, L. M. Data security in the world of cloud computing. IEEE Security & Privacy 7, 4 (July-Aug. 2009), 61-64.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 61-64
-
-
Kaufman, L.M.1
-
11
-
-
38149076425
-
Short group signature without random oracles
-
LIANG, X., CAO, Z., SHAO, J., AND LIN, H. Short group signature without random oracles. In Lecture Notes in Computer Science, ICICS 2007 (2007), pp. 69-82.
-
(2007)
Lecture Notes in Computer Science, ICICS 2007
, pp. 69-82
-
-
Liang, X.1
Cao, Z.2
Shao, J.3
Lin, H.4
-
12
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
LIN, X., SUN, X., HO, P.-H., AND SHEN, X. GSIS: a secure and privacy-preserving protocol for vehicular communication. IEEE Transactions on Vehicular Technology 56, 6 (2007), 3442-3456. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6 I
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
13
-
-
77953313061
-
Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
LU, R., LIN, X., AND SHEN, X. Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In The 29th IEEE International Conference on Computer Communications (INFOCOM 2010) (San Diego, California, USA, March 2010).
-
The 29th IEEE International Conference on Computer Communications (INFOCOM 2010) (San Diego, California, USA, March 2010)
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
14
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
LU, R., LIN, X., ZHU, H., HO, P.-H., AND SHEN, X. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In The 27th Conference on Computer Communications (INFOCOM 2008) (Phoenix, Arizona, USA, April 2008), pp. 1229-1237.
-
The 27th Conference on Computer Communications (INFOCOM 2008) (Phoenix, Arizona, USA, April 2008)
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.H.4
Shen, X.5
-
15
-
-
70349655467
-
Spark: A new vanet-based smart parking scheme for large parking lots
-
LU, R., LIN, X., ZHU, H., AND SHEN, X. Spark: a new vanet-based smart parking scheme for large parking lots. In The 28th Conference on Computer Communications (INFOCOM 2009) (Rio de Janeiro, Brazil, April 2009).
-
The 28th Conference on Computer Communications (INFOCOM 2009) (Rio de Janeiro, Brazil, April 2009)
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
16
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
LYNCH, C. A. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. Journal of the American Society for Information Sciene and Technology 52, 1 (2001), 12-17.
-
(2001)
Journal of the American Society for Information Sciene and Technology
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynch, C.A.1
-
17
-
-
67049116276
-
A tale of clouds: Paradigm comparisons and some thoughts on research issues
-
MEI, L., CHAN, W., AND TSE, T. A tale of clouds: Paradigm comparisons and some thoughts on research issues. In Proceedings of Asia-Pacific Services Computing Conference, APSCC'08 (Yilan, Dec. 2008), pp. 464-469.
-
Proceedings of Asia-Pacific Services Computing Conference, APSCC'08 (Yilan, Dec. 2008)
, pp. 464-469
-
-
Mei, L.1
Chan, W.2
Tse, T.3
-
18
-
-
1642489925
-
Oaep reconsidered
-
SHOUP, V. Oaep reconsidered. Journal of Cryptology 15, 4 (2002), 223-249.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
19
-
-
67651086975
-
A high-performance computing forecast: Partly cloudy
-
July-Aug.
-
STERLING, T., AND STARK, D. A high-performance computing forecast: Partly cloudy. Computing in Science & Engineering 11, 4 (July-Aug. 2009), 42-49.
-
(2009)
Computing in Science & Engineering
, vol.11
, Issue.4
, pp. 42-49
-
-
Sterling, T.1
Stark, D.2
-
20
-
-
63149163701
-
Cloud computing: New wine or just a new bottle?
-
March-April
-
VOAS, J., AND ZHANG, J. Cloud computing: New wine or just a new bottle? IT Professional 11, 2 (March-April 2009), 15-17.
-
(2009)
IT Professional
, vol.11
, Issue.2
, pp. 15-17
-
-
Voas, J.1
Zhang, J.2
-
21
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
WATERS, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. Cryptology ePrint Archive, Report 2008/290, 2008.
-
(2008)
Cryptology EPrint Archive, Report 2008/290
-
-
Waters, B.1
|