-
1
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., A. Fox, R. Griffith, A.D. Joseph and R. Katz et al., 2010. A view of cloud computing. Commun. ACM., 53: 50-58.
-
(2010)
Commun. ACM.
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
-
2
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Boneh, D., X. Boyen and E. Goh, 2005. Hierarchical identity based encryption with constant size ciphertext. Lecture Notes Comput. Sci., 3494: 440-456.
-
(2005)
Lecture Notes Comput. Sci.
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
4
-
-
0028483923
-
Locality-preserving hash functions for general purpose parallel computation
-
Chin, A., 1994. Locality-preserving hash functions for general purpose parallel computation. Algorithmic, 12: 170-181.
-
(1994)
Algorithmic
, vol.12
, pp. 170-181
-
-
Chin, A.1
-
5
-
-
70350525055
-
A reliable architecture for parallel implementations of the advanced encryption standard
-
Di Natale, G., M. Doulcier, M.L. Flottes and B. Rouzeyre, 2009. A reliable architecture for parallel implementations of the advanced encryption standard. J. Electr. Testing, 25: 269-278.
-
(2009)
J. Electr. Testing
, vol.25
, pp. 269-278
-
-
Di Natale, G.1
Doulcier, M.2
Flottes, M.L.3
Rouzeyre, B.4
-
8
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
August 2004, Springer, Berlin, Heidelberg
-
Gura, N., A. Patel, A. Wander, H. Eberle and C.S. Sheueling, 2004. Comparing elliptic curve cryptography and rsa on 8-bit cpus. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, LNCS., 3156, August 2004, Springer, Berlin, Heidelberg, pp: 119-132.
-
(2004)
Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems, LNCS., 3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Sheueling, C.S.5
-
9
-
-
71749101660
-
Towards an approach of semantic access control for cloud computing
-
Hu, L., S. Ying, X. Jia and K. Zhao, 2009. Towards an approach of semantic access control for cloud computing. Lecture Notes Comput. Sci., 5931: 145-156.
-
(2009)
Lecture Notes Comput. Sci.
, vol.5931
, pp. 145-156
-
-
Hu, L.1
Ying, S.2
Jia, X.3
Zhao, K.4
-
11
-
-
50649120532
-
-
Lang, B., I. Foster, F. Siebenlist, R. Ananthakrishnan and T. Freeman, 2006. Attribute based access control for grid computing, http://www.mcs.anl.gov/ uploads/cels/papers/P1367.pdf.
-
(2006)
Attribute Based Access Control for Grid Computing
-
-
Lang, B.1
Foster, I.2
Siebenlist, F.3
Ananthakrishnan, R.4
Freeman, T.5
-
12
-
-
0024984432
-
The number field sieve
-
Springer, Berlin
-
Lenstra, A.K., H.W. Lenstra, Jr., M.S. Manasse and J.M. Pollard, 1993. The number field sieve. Proceeding 22nd ACM Symposium Theory of Computing, (ACMSTC'93), Springer, Berlin, pp: 564-572.
-
(1993)
Proceeding 22nd ACM Symposium Theory of Computing, (ACMSTC'93)
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra Jr., H.W.2
Manasse, M.S.3
Pollard, J.M.4
-
16
-
-
0001637933
-
A monte carlo method for factorization
-
Pollard, M.J., 1975. A monte carlo method for factorization. BIT Numerical Math., 15: 331-334.
-
(1975)
BIT Numerical Math.
, vol.15
, pp. 331-334
-
-
Pollard, M.J.1
-
17
-
-
84966238549
-
Monte carlo methods of index computation (mod p)
-
Pollard, J.M., 1978. Monte carlo methods of index computation (mod p). Math. Comput, 32: 918-924.
-
(1978)
Math. Comput.
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R.L.,A. Shamir and L. Adleman, 1978. Amethod for obtaining digital signatures and public-key cryptosystems. ACM Commun, 21: 120-126.
-
(1978)
ACM Commun.
, vol.21
, pp. 120-126
-
-
-
19
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu, R.S. and P. Samarati, 1994. Access control: Principles and practice. IEEE Commun. Magazine, 32: 40-48.
-
(1994)
IEEE Commun. Magazine
, vol.32
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
20
-
-
0003902428
-
-
4th Edn., Prentice Hall, Upper Saddle River, New Jersey, ISBN: 0130914290
-
Stallings, W., 2006. Cryptography and Network Security: Principles and Practice. 4th Edn, Prentice Hall, Upper Saddle River, New Jersey, ISBN: 0130914290.
-
(2006)
Cryptography and Network Security: Principles and Practice
-
-
Stallings, W.1
-
21
-
-
78651350725
-
-
The Apache Software Foundation, The Apache Software Foundation
-
The Apache Software Foundation, 2009. The hadoop distributed file system architecture. The Apache Software Foundation.
-
(2009)
The hadoop distributed file system architecture
-
-
-
22
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., G. Ahn, T. Pai and S. Hong, 2005. Access control in collaborative systems. ACM Comput. Surv., 37: 29-41.
-
(2005)
ACM Comput. Surv.
, vol.37
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.2
Pai, T.3
Hong, S.4
-
23
-
-
27544511554
-
A trust based access control framework for P2P file-sharing systems
-
Tran, H., M. Hitchens, V. Varadharajan and P. Watters, 2005. A trust based access control framework for P2P file-sharing systems. Proc. Ann. Int. Conf. Syst. Sci., 9: 302c-302c.
-
(2005)
Proc. Ann. Int. Conf. Syst. Sci.
, vol.9
-
-
Tran, H.1
Hitchens, M.2
Varadharajan, V.3
Watters, P.4
-
24
-
-
85017313616
-
Cloud computing-issues research and implementations
-
Vouk, M.A., 2008. Cloud computing-issues, research and implementations. J. Comput. Inform. Technol., 4: 235-246.
-
(2008)
J. Comput. Inform. Technol.
, vol.4
, pp. 235-246
-
-
Vouk, M.A.1
|