-
1
-
-
79959557055
-
Addressing cloud computing security issues
-
March 2012, DOI=10 1016/j.future.2010.12.006
-
Dimitrios Zissis and Dimitrios Lekkas 2012 Addressing cloud computing security issues Future Gener Comput Svst 28, 3 (March 2012) 583-592. DOI=10 1016/j.future.2010.12.006
-
(2012)
Future Gener Comput Svst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
2
-
-
84866386247
-
Cloud Comnuting learning
-
4, 12-14 Oct., doi; 10.1109/iCAiC 1.2011.6110925
-
Kalagiakos, P.; Karamnelas, P., "Cloud Comnuting learning" Application of Information and Communication Technologies (AICT), 2011 5th International Conference on, vol., no., pp. 1, 4, 12-14 Oct. 2011 doi; 10.1109/iCAiC 1.2011.6110925
-
(2011)
Application of Information and Communication Technologies (AICT), 2011 5th International Conference On
, pp. 1
-
-
Kalagiakos, P.1
Karamnelas, P.2
-
3
-
-
84255186454
-
The architecture design of micro-learning platform based on cloud computing
-
ACM, New York, NY, USA, DOI-10.1145/2071639.2071659
-
Xiang Li, Jing Liu, Jun. Han, and Qian Zhang. 2011. The architecture design of micro-learning platform based on cloud computing. In Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing (ICCC'11). ACM, New York, NY, USA, 80-83. DOI-10.1145/2071639.2071659
-
(2011)
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing (ICCC'11)
, pp. 80-83
-
-
Li, X.1
Liu, J.2
Han, J.3
Zhang, Q.4
-
4
-
-
80053148753
-
Cloud computing security threats and responses
-
249, 27-29 May, doi; 10.1109/ICCSN.2011.6014715
-
Sabani, F., Cloud computing security threats and responses, Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, vol., no., pp. 245, 249, 27-29 May 2011 doi; 10.1109/ICCSN.2011.6014715
-
(2011)
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference On
, pp. 245
-
-
Sabani, F.1
-
5
-
-
84878474065
-
Characterizing hypervisor vulnerabilities in cloud computing servers
-
ACM, New York, N Y, USA, DOI-10.1145/2484402.2484406
-
Diego Perez-Botero, Jakub Szefer, and Ruby B. Lee. 2013. Characterizing hypervisor vulnerabilities in cloud computing servers. In Proceedings of the 2013 international workshop on Security in cloud computing (Cloud Computing'13). ACM, New York, N Y, USA, 3-10. DOI-10.1145/2484402.2484406.
-
(2013)
Proceedings of the 2013 International Workshop on Security in Cloud Computing (Cloud Computing'13)
, pp. 3-10
-
-
Perez-Botero, D.1
Szefer, J.2
Lee, R.B.3
-
6
-
-
34547248279
-
Quantum cryptography; A survey
-
Bruss, D., Erdelyi, Or., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography; A survey. ACM Computing Surveys (CSUR), 39(2), 6
-
(2007)
ACM Computing Surveys (CSUR)
, vol.39
, Issue.2
, pp. 6
-
-
Bruss, D.1
Erdelyi, Or.2
Meyer, T.3
Riege, T.4
Rothe, J.5
-
7
-
-
84862326265
-
A technique for image encryption based on explosive n*n block displacement followed by inter-pixel displacement of RGB attribute of a pixel
-
888, 11-13 May, doi; 10.1109/CSN1.2012.190
-
*n Block Displacement Followed by Inter-pixel Displacement of RGB Attribute of a Pixel", Communication Systems and Network lechnologies (CSNT), 2012 International Conference on, vol., no., pp. 884, 888, 11-13 May 2012 doi; 10.1109/CSN1.2012.190.
-
(2012)
Communication Systems and Network Lechnologies (CSNT), 2012 International Conference On
, pp. 884
-
-
Goel, A.1
Chandra, N.2
-
8
-
-
84872409662
-
Cryptographie technique for image encryption based on the RGB pixel displacement
-
77, 25-27 Oct., doi; 10.1109/ICAS lech.2012.6381069
-
Kester, Q.; Koumadi, K. M., "Cryptographie technique for image encryption based on the RGB pixel displacement", Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference on, vol., no., pp. 74, 77, 25-27 Oct. 2012 doi; 10.1109/ICAS lech.2012.6381069
-
(2012)
Adaptive Science & Technology (ICAST), 2012 IEEE 4th International Conference On
, pp. 74
-
-
Kester, Q.1
Koumadi, K.M.2
-
9
-
-
78651266535
-
Digital image encryption algorithm based on pixels
-
772, 29-31 Oct., doi; 10.1109/ICICIS YS. 2010.5658790
-
Guilang Zhu; Weiping Wang; Xiaoqiang Zhang; Mengmeng Wang, "Digital image encryption algorithm based on pixels", Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on, vol. 1, no., pp. 769, 772, 29-31 Oct. 2010 doi; 10.1109/ICICIS YS. 2010.5658790
-
(2010)
Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference On
, vol.1
, pp. 769
-
-
Zhu, G.1
Wang, W.2
Zhang, X.3
Wang, M.4
-
10
-
-
33746217099
-
Halftone visual cryptography
-
DOI 10.1109/TIP.2006.875249
-
Zhi Zhou; Arce, G. R.; Di Crescenzo, G., "Halftone visual cryptography", Image Processing, IEEE Transactions on, vol. 15, no. 8, pp. 2441, 2453, Aug. 2006 doi; 10.1109/TIP.2006.875249 (Pubitemid 44089115)
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.8
, pp. 2441-2453
-
-
Zhou, Z.1
Arce, G.R.2
Di Crescenzo, G.3
-
11
-
-
57349122990
-
Colour visual cryptography schemes
-
165, December, doi; 10.1049/iet-ifs;20080066
-
Liu, F.; Wu, C.-K.; Lin, X.-J.", Colour visual cryptography schemes", Information Security, IET, vol. 2, no. 4, pp. 151, 165, December 2008 doi; 10.1049/iet-ifs;20080066
-
(2008)
Information Security, IET
, vol.2
, Issue.4
, pp. 151
-
-
Liu, F.1
Wu, C.-K.2
Lin, X.-J.3
-
12
-
-
79551542887
-
Color extended visual cryptography using error diffusion
-
145, Jan., doi; 10.1109/TIP.2010.2056376
-
In Koo Kang; Arce, G. R.; Lee, Heung-Kyu, "Color Extended Visual Cryptography Using Error Diffusion,: Image Processing, fEEE iransactions on, vol. 20, no. 1, pp. 132, 145, Jan. 2011 doi; 10.1109/TIP.2010.2056376
-
(2011)
Image Processing, FEEE Iransactions On
, vol.20
, Issue.1
, pp. 132
-
-
Kang, I.1
Arce, G.R.2
Lee, H.-K.3
-
13
-
-
83455237417
-
Improving the visual quality of size invariant visual cryptography scheme
-
February 2012, DOI=10.1016/j.jvcir.2011.11.003
-
Feng Liu, Teng Guo, ChuanKun Wu, and Lina Qian. 2012. Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Comun. Image Represent. 23, 2(February 2012), 331-342. DOI=10.1016/j.jvcir.2011.11.003
-
(2012)
J. Vis. Comun. Image Represent
, vol.23
, Issue.2
, pp. 331-342
-
-
Liu, F.1
Guo, T.2
Wu, C.3
Qian, L.4
-
14
-
-
31244432974
-
A new approach for visual cryptography
-
December 2002, DOI=10.1023/A; 1019939020426
-
Wen-Otuey Tzeng and Chi-Ming Hu. 2002. A New Approach for Visual Cryptography. Des. Codes Cryptography 27, 3(December 2002), 207-227. DOI=10.1023/A; 1019939020426
-
(2002)
Des. Codes Cryptography
, vol.27
, Issue.3
, pp. 207-227
-
-
Tzeng, W.-O.1
Hu, C.-M.2
-
15
-
-
0037542969
-
-
Federal Information Processing Standards Publication 197. United States National Institute of Standards and 1 echnology NIST. November 26
-
Announcing the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and 1 echnology (NIST). November 26, 2001.
-
(2001)
Announcing the ADVANCED ENCRYPTION STANDARD (AES)
-
-
-
16
-
-
0004181422
-
-
9/04/, National Institute of Standards and Technology
-
Daemen, Joan; Rijmen, Vincent (9/04/2003). "AES Proposal; Rijndael". National Institute of Standards and Technology. p. 1.
-
(2003)
AES Proposal; Rijndael
, pp. 1
-
-
Daemen, J.1
Rijmen, V.2
-
17
-
-
84857469950
-
On the security of inclusion or omission of MixColumns in AES cipher
-
39, 11-14 Dec.
-
Al Marashda, K.; Al Salami, Y.; Salah, K.; Martin, T., "On the security of inclusion or omission of MixColumns in AES cipher", Internet 1 echnology and Secured Iransactions (ICITST), 2011 International Conference for, vol., no., pp. 34, 39, 11-14 Dec. 2011
-
(2011)
Internet 1 Echnology and Secured Iransactions (ICITST), 2011 International Conference For
, pp. 34
-
-
Al Marashda, K.1
Al Salami, Y.2
Salah, K.3
Martin, T.4
-
18
-
-
77958112921
-
Differential fault analysis against AES-192 and AES-256 with minimal faults
-
9, 21-21 Aug., doi; 10.1109/FD1C.2010.10
-
Chong Hee Kim, "Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults", Fault Diagnosis and tolerance in Cryptography (FD1C), 2010 Workshop on, vol., no., pp. 3, 9, 21-21 Aug. 2010 doi; 10.1109/FD1C.2010.10
-
(2010)
Fault Diagnosis and Tolerance in Cryptography (FD1C), 2010 Workshop On
, pp. 3
-
-
Kim, C.H.1
-
19
-
-
83455187945
-
From AES-128 to AES-192 and AES-256, how to adapt differential fault analysis attacks on key expansion
-
53, 28-28 Sept., doi; 10.1109/FD1C.2011.15
-
Floissac, N.; Lhyver, Y., "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion", Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on, vol., no., pp. 43, 53, 28-28 Sept. 2011 doi; 10.1109/FD1C.2011.15
-
(2011)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop On
, pp. 43
-
-
Floissac, N.1
Lhyver, Y.2
-
20
-
-
83455166352
-
A differential fault analysis on AES key schedule using single fault
-
42, 28-28 Sept., doi; 10.1109/FD1C.2011.10
-
Ali, S. S.; Mukhopadhyay, D., "A Differential Fault Analysis on AES Key Schedule Using Single Fault", Fault Diagnosis and tolerance in Cryptography (FDTC), 2011 Workshop on, vol., no., pp. 35, 42, 28-28 Sept. 2011 doi; 10.1109/FD1C.2011.10
-
(2011)
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop On
, pp. 35
-
-
Ali, S.S.1
Mukhopadhyay, D.2
-
21
-
-
79956299075
-
Meet-in-themiddle attack on 8 rounds of the AES block cipher under 192 key bits
-
Feng Bao and Jian Weng Eds.. Springer-Verlag, Berlin, Heidelberg
-
Yongzhuang Wei, Jiqiang Lu, and Yupu Hu. 2011. Meet-in-themiddle attack on 8 rounds of the AES block cipher under 192 key bits, In Proceedings of the 7th international conference on Information security practice and experience (ISPEC'11), Feng Bao and Jian Weng (Eds.). Springer-Verlag, Berlin, Heidelberg, 222-232.
-
(2011)
Proceedings of the 7th International Conference on Information Security Practice and Experience (ISPEC'11)
, pp. 222-232
-
-
Wei, Y.1
Lu, J.2
Hu, Y.3
-
22
-
-
12444346059
-
A collision attack on 7 rounds of Rijndael
-
New York, USA
-
H. Gilbert, M. Minier, A collision attack on 7 rounds of Rijndael, in Proceedings of the third AES Candidate Conference (AES3), New York, USA (2000), pp. 230-241
-
(2000)
Proceedings of the Third AES Candidate Conference (AES3)
, pp. 230-241
-
-
Gilbert, H.1
Minier, M.2
-
23
-
-
18844374511
-
AES and the Cryptonite crypto processor
-
CASES 2003: International Conference on Compilers, Architecture, and Synthesis for Embedded Systems
-
Dino Oliva, Rainer Buchty, and Nevin Heintze. 2003. AES and the cryptonite crypto processor, In Proceedings of the 2003 international conference on Compilers, architecture and synthesis tor embedded systems (CASES'03). ACM, New York, NY, USA, 198-209. DOI=10.1145/951710.951738 (Pubitemid 40682164)
-
(2003)
CASES 2003: International Conference on Compilers, Architecture, and Synthesis for Embedded Systems
, pp. 198-209
-
-
Oliva, D.1
Buchty, R.2
Heintze, N.3
-
24
-
-
34249710720
-
Projective aspects of the AES inversion
-
DOI 10.1007/s10623-007-9059-4
-
Wen-Ai Jackson and S. Murphy. 2007. Projective aspects of the AES inversion. Des. Codes Cryptography 43, 2-3(June 2007), 167-179. DOI=10.1007/s 10623-007-9059-4 (Pubitemid 46828741)
-
(2007)
Designs, Codes, and Cryptography
, vol.43
, Issue.2-3
, pp. 167-179
-
-
Jackson, W.-A.1
Murphy, S.2
-
25
-
-
33745588540
-
Proving the security of AES substitution-permutation network
-
Bart Preneel and Stafford favares Eds.. Springer-Verlag, Berlin, Heidelberg, DOI=10.1007/116933835
-
Thomas Baigneres and Serge Vaudenay. 2005. Proving the security of AES substitution-permutation network. In Proceedings of the 12th international conference on Selected Areas in Cryptography (SAC 05), Bart Preneel and Stafford favares (Eds.). Springer-Verlag, Berlin, Heidelberg, 65-81. DOI=10.1007/116933835
-
(2005)
Proceedings of the 12th International Conference on Selected Areas in Cryptography (SAC 05)
, pp. 65-81
-
-
Baigneres, T.1
Vaudenay, S.2
-
26
-
-
64849108004
-
An 8-bit systolic AES architecture for moderate data rate applications
-
May 2009, DOI=10.1016/j.micpro.2009.02.013
-
Sheikh Muhammad Farhan, Shoab A. Khan, and Habibullah Jamal. 2009. An 8-bit systolic AES architecture for moderate data rate applications. Microprocess. Microsyst. 55, 3(May 2009), 221-231. DOI=10.1016/j.micpro.2009.02. 013
-
(2009)
Microprocess. Microsyst.
, vol.55
, Issue.3
, pp. 221-231
-
-
Farhan, S.M.1
Khan, S.A.2
Jamal, H.3
-
27
-
-
77950297814
-
Single- and multi-core configurable AES architectures for flexible security
-
552, April, doi; 10.1109/TVLSI.2009.2013231
-
Mao-Yin Wang; Chih-Pin Su; Chia-Lung Horng; Cheng-Wen Wu; Chih-Tsun Huang, "Single- and Multi-core Configurable AES Architectures for Flexible Security", Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 18, no. 4, pp. 541, 552, April 2010 doi; 10.1109/TVLSI.2009.2013231
-
(2010)
Very Large Scale Integration (VLSI) Systems, IEEE Transactions On
, vol.18
, Issue.4
, pp. 541
-
-
Wang, M.-Y.1
Su, C.-P.2
Horng, C.-L.3
Wu, C.-W.4
Huang, C.-T.5
-
28
-
-
66149101528
-
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
-
5, 14-16 Oct.
-
Vishnu, M. B.; Tiong, S. K.; Zaini, M.; Koh, S. P., "Security enhancement of digital motion image transmission using hybrid AES-DES algorithm", Communications, 2008. APCC 2008. 14th Asia-Pacific Conference on, vol., no., pp. 1, 5, 14-16 Oct. 2008
-
(2008)
Communications, 2008. APCC 2008. 14th Asia-pacific Conference On
, pp. 1
-
-
Vishnu, M.B.1
Tiong, S.K.2
Zaini, M.3
Koh, S.P.4
-
29
-
-
84876521585
-
FPGA implementation of high speed VLSI architectures for AES algorithm
-
242, 5-7 Nov., doi; 10.1109/ICE IE 1.2012.53
-
Kshirsagar, R. V.; Vyawahare, M. V., "FPGA Implementation of High Speed VLSI Architectures for AES Algorithm", Emerging Trends in Engineering and 1 echnology (ICE TET), 2012 Fifth International Conference on, vol., no., pp. 239, 242, 5-7 Nov. 2012 doi; 10.1109/ICE IE 1.2012.53
-
(2012)
Emerging Trends in Engineering and 1 Echnology (ICE TET), 2012 Fifth International Conference On
, pp. 239
-
-
Kshirsagar, R.V.1
Vyawahare, M.V.2
-
30
-
-
84863111662
-
A secure software implementation of nonlinear AES S-box with the enhancement of biometrics
-
932, 21-22 March, doi; 10.1109/ICCEE1.2012.6203796
-
Otanesh, E. S.; Velayutham, R.; Manimegalai, D., "A secure software implementation of nonlinear AES S-box with the enhancement of biometrics", Computing, Electronics and Electrical Technologies (ICCEE1), 2012 International Conference on, vol., no., pp. 927, 932, 21-22 March 2012 doi; 10.1109/ICCEE1.2012.6203796
-
(2012)
Computing, Electronics and Electrical Technologies (ICCEE1), 2012 International Conference On
, pp. 927
-
-
Otanesh, E.S.1
Velayutham, R.2
Manimegalai, D.3
-
32
-
-
79851487059
-
Research and realization based on hybrid encryption algorithm of improved AES and ECC
-
400, 23-25 Nov., doi; 10.1109/ICALIP.2010.5684554
-
Xiang Li; Junli Chen; Dinghu Qin; Wanggen Wan, "Research and realization based on hybrid encryption algorithm of improved AES and ECC", Audio Language and fmage Processing (ICALIP), 2010 International Conference on, vol., no., pp. 396, 400, 23-25 Nov. 2010 doi; 10.1109/ICALIP.2010.5684554
-
(2010)
Audio Language and Fmage Processing (ICALIP), 2010 International Conference On
, pp. 396
-
-
Li, X.1
Chen, J.2
Qin, D.3
Wan, W.4
-
33
-
-
33646500392
-
The rijndael algorithm
-
DOI 10.1109/MP.2004.1289996
-
Jamil, T., "The Rijndael algorithm", Potentials, IEEE, vol. 23, no. 2, pp. 36, 38, April-May 2004 doi; 10.1109/MP.2004.1289996 (Pubitemid 44208047)
-
(2004)
IEEE Potentials
, vol.23
, Issue.2
, pp. 36-38
-
-
Jamil, T.1
|