-
1
-
-
84866668858
-
-
July
-
A. N. Khan, M.L. Mat Kiah, S. U. Khan, S. A. Madani. "Towards secure mobile cloud computing: A survey. Future Generation Computer Systems". July 2013, vol. 29, no.5, pp. 1278-1299.
-
(2013)
Towards Secure Mobile Cloud Computing: A Survey. Future Generation Computer Systems
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Mat Kiah, M.L.2
Khan, S.U.3
Madani, S.A.4
-
2
-
-
84872074603
-
Efficient and secure data storage operations for mobile cloud computing
-
22-26 Oct. Las Vegas, NV
-
Z. Zhou, D. Huang, "Efficient and secure data storage operations for mobile cloud computing", Network and service management (cnsm), 2012 8th international conference and 2012 workshop on systems virtualiztion management (svm). 22-26 Oct. 2012. Las Vegas, NV. pp. 37-45.
-
(2012)
Network and Service Management (Cnsm), 2012 8th International Conference and 2012 Workshop on Systems Virtualiztion Management (Svm)
, pp. 37-45
-
-
Zhou, Z.1
Huang, D.2
-
3
-
-
84863238100
-
Cryptography and security-dynamic secure cloud storage with provenance
-
S. S.M. Chow, C. Chu, X. Huang, J. Zhou, R. H. Deng. "Cryptography and security-dynamic secure cloud storage with provenance". Cryptography and Security: From Theory to Applications, Lecture Notes in Computer Science, vol 6805, 2012, pp. 442-464.
-
(2012)
Cryptography and Security: From Theory to Applications, Lecture Notes in Computer Science
, vol.6805
, pp. 442-464
-
-
Chow, S.S.M.1
Chu, C.2
Huang, X.3
Zhou, J.4
Deng, R.H.5
-
4
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
INFOCOM WKSHPS, Shanghai, China, Apr
-
W. Jia, H. Zhu, Z. Cao, L. Wei, X. Lin, "SDSM: A secure data service mechanism in mobile cloud computing", in: Proc. IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, Shanghai, China, Apr. 2011. pp. 1060-1065.
-
(2011)
Proc. IEEE Conference on Computer Communications Workshops
, pp. 1060-1065
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
7
-
-
79952510987
-
Expressive keypolicy attribute-Based encryption with constant-size ciphertexts
-
Taormina, Italy, March 6-9
-
N. Attrapadung, B. Libert, E. de Panafieu. "Expressive keypolicy attribute-Based encryption with constant-size ciphertexts". 14th International Conference on Practice and Theory in Public Key Cryptography(Public Key Cryptography-PKC 2011), Taormina, Italy, March 6-9, 2011.pp. 90-108.
-
(2011)
14th International Conference on Practice and Theory in Public Key Cryptography(Public Key Cryptography-PKC 2011)
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
8
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
20-23 May, Berkeley, CA
-
J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-policy attribute-based encryption". Proceeding SP '07 proceedings of 2007 IEEE Symposium on Security and Privacy. 20-23 May 2007, Berkeley, CA. pp. 321-334.
-
(2007)
Proceeding SP '07 Proceedings of 2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
9
-
-
77949581448
-
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
-
Zurich, Switzerland, February 9-11
-
A. Lewko, B. Waters, "New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts," in 7th Theory of Cryptography Conference(TCC 2010), Zurich, Switzerland, February 9-11, 2010, pp. 455-479.
-
(2010)
7th Theory of Cryptography Conference(TCC 2010)
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
|