-
1
-
-
84874114744
-
-
"Google apps," http://www.google.com/apps.
-
Google Apps
-
-
-
2
-
-
84882786458
-
-
"Microsoft online," http://www.microsoft.com/online.
-
Microsoft Online
-
-
-
3
-
-
84885573531
-
-
"Amazon ec2," http://aws.amazon.com/ec2/.
-
Amazon ec2
-
-
-
4
-
-
84886582205
-
-
"Eucalyptus," http://www.eucalyptus.com/.
-
Eucalyptus
-
-
-
5
-
-
84856142311
-
-
"Nimbus," http://www.nimbusproject.org/.
-
Nimbus
-
-
-
6
-
-
84856195467
-
-
"Amazon s3," http://aws.amazon.com/s3/.
-
Amazon s3
-
-
-
7
-
-
84864720397
-
-
"Windows azure," http://www.microsoft.com/windowsazure/.
-
Windows Azure
-
-
-
8
-
-
71749113079
-
Identity-based authentication for cloud computing
-
CloudCom, ser. M. G. Jaatun, G. Zhao, and C. Rong, Eds., Springer
-
H. Li, Y. Dai, L. Tian, and H. Yang, "Identity-based authentication for cloud computing," in CloudCom, ser. Lecture Notes in Computer Science, M. G. Jaatun, G. Zhao, and C. Rong, Eds., vol. 5931. Springer, 2009, pp. 157-166.
-
(2009)
Lecture Notes in Computer Science
, vol.5931
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
9
-
-
77954749319
-
Token-based cloud computing
-
TRUST, ser. A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds., Springer
-
A.-R. Sadeghi, T. Schneider, and M. Winandy, "Token-based cloud computing,"in TRUST, ser. Lecture Notes in Computer Science, A. Acquisti, S. W. Smith, and A.-R. Sadeghi, Eds., vol. 6101. Springer, 2010, pp. 417-429.
-
(2010)
Lecture Notes in Computer Science
, vol.6101
, pp. 417-429
-
-
Sadeghi, A.-R.1
Schneider, T.2
Winandy, M.3
-
11
-
-
11144229255
-
-
Ph.D. dissertation, Wroclaw University of Technology
-
G. Wroblewski, "General method of program code obfuscation,"Ph. D. dissertation, Wroclaw University of Technology, 2002, http://www.ouah.org/ wobfuscation.pdf.
-
(2002)
General Method of Program Code Obfuscation
-
-
Wroblewski, G.1
-
12
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
-
IEEE Symposium on Security and Privacy, 2000
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
13
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds. ACM
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions,"in ACM Conference on Computer and Communications Security, A. Juels, R. N. Wright, and S. D. C. di Vimercati, Eds. ACM, 2006, pp. 79-88.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
14
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
IEEE
-
J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, andW. Lou, "Fuzzy keyword search over encrypted data in cloud computing," in INFOCOM. IEEE, 2010, pp. 441-445.
-
(2010)
INFOCOM
, pp. 441-445
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
15
-
-
77956137294
-
Cryptographic cloud storage
-
Financial Cryptography Workshops, ser. R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, Eds., Springer
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in Financial Cryptography Workshops, ser. Lecture Notes in Computer Science, R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, Eds., vol. 6054. Springer, 2010, pp. 136-149.
-
(2010)
Lecture Notes in Computer Science
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
16
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
SecureComm, ser. Social Informatics and Telecommunications Engineering, S. Jajodia and J. Zhou, Eds., Springer
-
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in SecureComm, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, S. Jajodia and J. Zhou, Eds., vol. 50. Springer, 2010, pp. 89-106.
-
(2010)
Lecture Notes of the Institute for Computer Sciences
, vol.50
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
17
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
D. Feng, D. A. Basin, and P. Liu, Eds. ACM
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in ASIACCS, D. Feng, D. A. Basin, and P. Liu, Eds. ACM, 2010, pp. 261-270.
-
(2010)
ASIACCS
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
18
-
-
79957993008
-
Decentralizing attribute-based encryption
-
EUROCRYPT, ser. K. G. Paterson, Ed., Springer
-
A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption,"in EUROCRYPT, ser. Lecture Notes in Computer Science, K. G. Paterson, Ed., vol. 6632. Springer, 2011, pp. 568-588.
-
(2011)
Lecture Notes in Computer Science
, vol.6632
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
19
-
-
24944554962
-
Fuzzy identity-based encryption
-
EUROCRYPT, ser. R. Cramer, Ed., Springer
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in EUROCRYPT, ser. Lecture Notes in Computer Science, R. Cramer, Ed., vol. 3494. Springer, 2005, pp. 457-473.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
20
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in CRYPTO, 1984, pp. 47-53.
-
(1984)
CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in ACM Conference on Computer and Communications Security, 2006, pp. 89-98.
-
ACM Conference on Computer and Communications Security, 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
22
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
IEEE Computer Society
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007, pp. 321-334.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
23
-
-
38049078557
-
Multi-authority attribute based encryption
-
TCC, ser. Springer
-
M. Chase, "Multi-authority attribute based encryption," in TCC, ser. Lecture Notes in Computer Science, vol. 4392. Springer, 2007, pp. 515-534.
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
25
-
-
79960367690
-
Improved access control mechanism in vehicular ad hoc networks
-
ADHOC-NOW, ser. H. Frey, X. Li, and S. Rührup, Eds., Springer
-
S. Ruj, A. Nayak, and I. Stojmenovic, "Improved access control mechanism in vehicular ad hoc networks," in ADHOC-NOW, ser. Lecture Notes in Computer Science, H. Frey, X. Li, and S. Rührup, Eds., vol. 6811. Springer, 2011, pp. 191-205.
-
(2011)
Lecture Notes in Computer Science
, vol.6811
, pp. 191-205
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
26
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds. ACM
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in ACM Conference on Computer and Communications Security, E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds. ACM, 2010, pp. 735-737.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
27
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
EUROCRYPT, ser. L. R. Knudsen, Ed., Springer
-
J. Horwitz and B. Lynn, "Toward hierarchical identity-based encryption,"in EUROCRYPT, ser. Lecture Notes in Computer Science, L. R. Knudsen, Ed., vol. 2332. Springer, 2002, pp. 466-481.
-
(2002)
Lecture Notes in Computer Science
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
28
-
-
80053267265
-
Distributed fine-grained access control in wireless sensor networks
-
IEEE
-
S. Ruj, A. Nayak, and I. Stojmenovic, "Distributed fine-grained access control in wireless sensor networks," in IPDPS. IEEE, 2011, pp. 352-362.
-
(2011)
IPDPS
, pp. 352-362
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
30
-
-
84856196612
-
-
"http://crypto.stanford.edu/pbc/."
-
-
-
-
31
-
-
84856148993
-
-
V. S. Miller, "http://crypto.stanford.edu/miller/miller.pdf."
-
-
-
Miller, V.S.1
-
32
-
-
73849107877
-
A taxonomy of pairing-friendly elliptic curves
-
D. Freeman, M. Scott, and E. Teske, "A taxonomy of pairing-friendly elliptic curves," J. Cryptology, vol. 23, no. 2, pp. 224-280, 2010.
-
(2010)
J. Cryptology
, vol.23
, Issue.2
, pp. 224-280
-
-
Freeman, D.1
Scott, M.2
Teske, E.3
-
33
-
-
79952071204
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, pp. 673-686, 2011.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
36
-
-
79951783454
-
Attribute-based signatures
-
CT-RSA, ser. A. Kiayias, Ed., Springer
-
H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-based signatures,"in CT-RSA, ser. Lecture Notes in Computer Science, A. Kiayias, Ed., vol. 6558. Springer, 2011, pp. 376-392.
-
(2011)
Lecture Notes in Computer Science
, vol.6558
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
|