메뉴 건너뛰기




Volumn 135, Issue , 2012, Pages 255-263

Design of security solution to mobile cloud storage

Author keywords

data security; Mobile cloud storage; searchable encryption; security solution

Indexed keywords

CASE BASED; CLOUD SERVICES; DIRECT METHOD; ENCRYPTION SCHEMES; ENCRYPTION TECHNOLOGIES; MOBILE USERS; PERFORMANCE ISSUES; SECURITY FUNCTIONS; SECURITY SOLUTIONS; STORAGE SYSTEMS;

EID: 84860159525     PISSN: 18675662     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-27708-5_34     Document Type: Conference Paper
Times cited : (14)

References (11)
  • 1
    • 70449482830 scopus 로고    scopus 로고
    • Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124
    • Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 (2008
    • (2008) Guidelines on Cell Phone and PDA Security
    • Jansen, W.1    Scarfone, K.2
  • 5
    • 50049095455 scopus 로고    scopus 로고
    • Public key encryption with conjunctive keyword search and its extension to a multi-user system
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Springer, Heidelberg
    • Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007
    • (2007) Pairing 2007. LNCS , vol.4575 , pp. 2-22
    • Hwang, Y.-H.1    Lee, P.J.2
  • 7
    • 84860161867 scopus 로고    scopus 로고
    • Trusted mobileclient for document security in mobile office automationi
    • Yu, X., Wen, Q.: Trusted MobileClient for Document Security in Mobile Office AutomationI. J. Information Technology and Computer Science 1, 54-62 (2011
    • (2011) J. Information Technology and Computer Science , vol.1 , pp. 54-62
    • Yu, X.1    Wen, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.