-
1
-
-
78649290366
-
-
National Institute of Standards and Technology [Online]. Available
-
P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009. [Online]. Available: http://csrc.nist. gov/groups/SNS/cloud- computing/cloud-def-v15.doc
-
(2009)
The NIST Definition of Cloud Computing
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
2
-
-
84897722550
-
-
October October [Online]. Available
-
D. Chappell, "Introducing the Windows azure platform," October, vol. 30, no. October, p. 2010, 2010. [Online]. Available: http://download. microsoft.com/download/C/0/2/C02C4D26-0472-4688AC13-199EA321135E/ Introduce-Azure-Services-Platform-1-2.pdf
-
(2010)
Introducing the Windows Azure Platform
, vol.30
, pp. 2010
-
-
Chappell, D.1
-
4
-
-
77956137294
-
Cryptographic cloud storage
-
Berlin, Heidelberg: Springer-Verlag [Online]. Available
-
S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proceedings of the 14th international conference on Financial cryptograpy and data security, ser. FC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 136-149. [Online]. Available: http://dl.acm.org/citation.cfm?id=1894863.1894876
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, Ser. FC'10
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
5
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
ACM
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85-90.
-
(2009)
Proceedings of the 2009m ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
8
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA: Springer-Verlag New York, Inc.
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
9
-
-
11244267013
-
-
Secaucus, NJ, USA: Springer-Verlag New York, Inc.
-
D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
10
-
-
23044483770
-
-
New York, NY, USA: Cambridge University Press
-
I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels, Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). New York, NY, USA: Cambridge University Press, 2005.
-
(2005)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
Cassels, J.W.S.4
|