-
2
-
-
80155167231
-
A security framework of group location-based mobile applications in cloud computing
-
September Taipei, Taiwan 10.1109/ICPPW.2011.6 2-s2.0-80155167231
-
Chen Y.-J., Wang L.-C., A security framework of group location-based mobile applications in cloud computing. Proceeding of the International Conference on Parallel Processing Workshops (ICPPW '11) September 2011 Taipei, Taiwan 184 190 10.1109/ICPPW.2011.6 2-s2.0-80155167231
-
(2011)
Proceeding of the International Conference on Parallel Processing Workshops (ICPPW '11)
, pp. 184-190
-
-
Chen, Y.-J.1
Wang, L.-C.2
-
3
-
-
84896317870
-
A survey on vehicular cloud computing
-
Whaiduzzaman M., Sookhak M., Gani A., Buyya R., A survey on vehicular cloud computing. Journal of Network and Computer Applications 2014 40 325 344
-
(2014)
Journal of Network and Computer Applications
, vol.40
, pp. 325-344
-
-
Whaiduzzaman, M.1
Sookhak, M.2
Gani, A.3
Buyya, R.4
-
4
-
-
77950347409
-
A view of cloud computing
-
10.1145/1721654.1721672 2-s2.0-77950347409
-
Armbrust M., Fox A., Griffith R., Joseph A. D., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A., Stoica I., Zaharia M., A view of cloud computing. Communications of the ACM 2010 53 4 50 58 10.1145/1721654.1721672 2-s2.0-77950347409
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
5
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
10.1109/MNET.2010.5510914 2-s2.0-77954843911
-
Wang C., Ren K., Lou W., Li J., Toward publicly auditable secure cloud data storage services. IEEE Network 2010 24 4 19 24 10.1109/MNET.2010.5510914 2-s2.0-77954843911
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
6
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
10.1016/j.ins.2013.04.028 2-s2.0-84877596233
-
Wei L., Zhu H., Cao Z., Dong X., Jia W., Chen Y., Vasilakos A. V., Security and privacy for storage and computation in cloud computing. Information Sciences 2014 258 371 386 10.1016/j.ins.2013.04.028 2-s2.0-84877596233
-
(2014)
Information Sciences
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
7
-
-
56449089063
-
Multimodal face and fingerprint biometrics authentication on space-limited tokens
-
10.1016/j.neucom.2007.12.017 2-s2.0-56449089063
-
Khan M. K., Zhang J., Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 2008 71 13-15 3026 3031 10.1016/j.neucom.2007.12.017 2-s2.0-56449089063
-
(2008)
Neurocomputing
, vol.71
, Issue.13-15
, pp. 3026-3031
-
-
Khan, M.K.1
Zhang, J.2
-
8
-
-
33745634868
-
An efficient and practical fingerprint-based remote user authentication scheme with smart cards
-
DOI 10.1007/11689522-24, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings
-
Khan M., Zhang J., Chen K., Deng R., Lai X., Zhou J., An efficient and practical fingerprint-based remote user authentication scheme with smart cards. Information Security Practice and Experience 2006 3903 Berlin, Germany Springer 260 268 Lecture Notes in Computer Science 10.1007/11689522-24 (Pubitemid 43986924)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3903 LNCS
, pp. 260-268
-
-
Khan, M.K.1
Zhang, J.2
-
9
-
-
84904698524
-
-
Amazon's S3 down for several hours, 2008
-
Gohring N.,. Amazon's S3 down for several hours, 2008, http://status.aws.amazon.com/s3-20080720.html
-
-
-
Gohring, N.1
-
12
-
-
84904648305
-
-
Epsilon breach: hack of the century?, 2011
-
Storm D.,. Epsilon breach: hack of the century?, 2011, http://blogs.computerworld.com/18079/epsilon-breach-hack-of-the-century
-
-
-
Storm, D.1
-
14
-
-
79959823910
-
Remote data checking using provable data possession
-
10.1145/1952982.1952994 2-s2.0-79959823910
-
Ateniese G., Burns R., Curtmola R., Herring J., Khan O., Kissner L., Peterson Z., Song D., Remote data checking using provable data possession. ACM Transactions on Information and System Security 2011 14 1, article 12 10.1145/1952982.1952994 2-s2.0-79959823910
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.1 ARTICLE 12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
15
-
-
74049102823
-
Provable data possession at untrusted stores
-
November Virginia, Va, USA 10.1145/1315245.1315318 2-s2.0-74049102823
-
Ateniese G., Burns R., Curtmola R., Herring J., Kissner L., Peterson Z., Song D., Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07) November 2007 Virginia, Va, USA 598 609 10.1145/1315245.1315318 2-s2.0-74049102823
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
16
-
-
70249129465
-
Scalable and efficient provable data possession
-
September Istanbul, Turkey ACM 10.1145/1460877.1460889 2-s2.0-70249129465
-
Ateniese G., Pietro R. D., Mancini L. V., Tsudik G., Scalable and efficient provable data possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm '08) September 2008 Istanbul, Turkey ACM 1 10 10.1145/1460877.1460889 2-s2.0-70249129465
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm '08)
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
17
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
10.1109/TPDS.2012.278
-
Yang K., Jia X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems 2012 24 9 1717 1726 10.1109/TPDS.2012.278
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.9
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
18
-
-
74049121230
-
Dynamic provable data possession
-
November Chicago, Ill, USA ACM 10.1145/1653662.1653688 2-s2.0-74049121230
-
Erway C., Küpçü A., Papamanthou C., Tamassia R., Dynamic provable data possession. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09) November 2009 Chicago, Ill, USA ACM 213 222 10.1145/1653662.1653688 2-s2.0-74049121230
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09)
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
19
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
10.1109/TPDS.2010.183 2-s2.0-79953294892
-
Wang Q.-A., Wang C., Ren K., Lou W.-J., Li J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 2011 22 5 847 859 10.1109/TPDS.2010.183 2-s2.0-79953294892
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.-A.1
Wang, C.2
Ren, K.3
Lou, W.-J.4
Li, J.5
-
20
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
10.1109/TSC.2011.24 2-s2.0-84861957968
-
Wang C., Wang Q., Ren K., Cao N., Lou W., Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing 2012 5 2 220 232 10.1109/TSC.2011.24 2-s2.0-84861957968
-
(2012)
IEEE Transactions on Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
21
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Wang H., Proxy provable data possession in public clouds. IEEE Transactions on Services Computing 2012 6 4 551 559
-
(2012)
IEEE Transactions on Services Computing
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
22
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
10.1109/TC.2011.245
-
Wang C., Chow S. S. M., Wang Q., Ren K., Lou W., Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers 2013 62 2 362 375 10.1109/TC.2011.245
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
23
-
-
84871533728
-
Proof of possession for cloud storage via lagrangian interpolation techniques
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Krzywiecki Ł., Kutyłowski M., Xu L., Bertino E., Mu Y., Proof of possession for cloud storage via lagrangian interpolation techniques. Network and System Security 2012 7645 Berlin, Germany Springer 305 319 Lecture Notes in Computer Science
-
(2012)
Network and System Security
, vol.7645
, pp. 305-319
-
-
Krzywiecki, Ł.1
Kutyłowski, M.2
Xu, L.3
Bertino, E.4
Mu, Y.5
-
24
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
10.1109/TKDE.2007.190647 2-s2.0-46649083439
-
Sebé F., Domingo-Ferrer J., Martínez-Ballesté A., Deswarte Y., Quisquater J., Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering 2008 20 8 1034 1038 10.1109/TKDE.2007.190647 2-s2.0-46649083439
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Deswarte, Y.4
Quisquater, J.5
-
27
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Berlin, Germany Springer 10.1007/3-540-39200-9-26 MR2090433 2-s2.0-35248835575
-
Boneh D., Gentry C., Lynn B., Shacham H., Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology (EUROCRYPT) 2003 Berlin, Germany Springer 416 432 10.1007/3-540-39200-9-26 MR2090433 2-s2.0-35248835575
-
(2003)
Advances in Cryptology (EUROCRYPT)
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
29
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
Goldreich O., Ostrovsky R., Software protection and simulation on oblivious RAMs. Journal of the ACM 1996 43 3 431 473 10.1145/233551.233553 MR1408562 2-s2.0-0030149547 (Pubitemid 126607640)
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
30
-
-
0025436383
-
Skip lists. A probabilistic alternative to balanced trees
-
DOI 10.1145/78973.78977
-
Pugh W., Skip lists: a probabilistic alternative to balanced trees. Communications of the ACM 1990 33 6 668 676 10.1145/78973.78977 (Pubitemid 21672422)
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh William1
-
31
-
-
84900355325
-
Efficient dynamic provable possession of remote data via update trees
-
Zhang Y., Blanton M., Efficient dynamic provable possession of remote data via update trees. IACR Cryptology ePrint Archive 2012 2012 291
-
(2012)
IACR Cryptology EPrint Archive
, vol.2012
, pp. 291
-
-
Zhang, Y.1
Blanton, M.2
-
32
-
-
84920380941
-
Protocols for public key cryptosystems
-
April 10.1109/SP.1980.10006 2-s2.0-0019292439
-
Merkle R. C., Protocols for public key cryptosystems. Proceedings of the IEEE Symposium on Security and Privacy April 1980 122 134 10.1109/SP.1980.10006 2-s2.0-0019292439
-
(1980)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
33
-
-
84873952327
-
Algebraic (trapdoor) one-way functions and their applications
-
Berlin, Germany Springer Lecture Notes in Computer Science
-
Catalano D., Fiore D., Gennaro R., Vamvourellis K., Sahai A., Algebraic (trapdoor) one-way functions and their applications. Theory of Cryptography 2013 7785 Berlin, Germany Springer 680 699 Lecture Notes in Computer Science
-
(2013)
Theory of Cryptography
, vol.7785
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
Sahai, A.5
-
34
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
Sookhak M., Talebian H., Ahmed E., Gani A., Khan M. K., A review on remote data auditing in single cloud server: taxonomy and open issues. Journal of Network and Computer Applications 2014
-
(2014)
Journal of Network and Computer Applications
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
35
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
DOI 10.1109/ICDCS.2006.80, 26th IEEE Internationa26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006
-
Schwarz T. S. J., Miller E. L., Store, forget, and check: using algebraic signatures to check remotely administered storage. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 2006 12 10.1109/ICDCS.2006.80 (Pubitemid 46490972)
-
(2006)
Proceedings - International Conference on Distributed Computing Systems
, vol.2006
, pp. 1648799
-
-
Thomas Schwarz, S.J.1
Miller, E.L.2
-
37
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
May Washington, DC, USA 2-s2.0-0024866111
-
Impagliazzo R., Levin L. A., Luby M., Pseudo-random generation from one-way functions. Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing Seattle May 1989 Washington, DC, USA 12 24 2-s2.0-0024866111
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing Seattle
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
39
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
May Shanghai, China 10.1109/CCGRID.2009.93 2-s2.0-70349750047
-
Nurmi D., Wolski R., Grzegorczyk C., Obertelli G., Soman S., Youseff L., Zagorodnov D., The eucalyptus open-source cloud-computing system. Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09) May 2009 Shanghai, China 124 131 10.1109/CCGRID.2009.93 2-s2.0-70349750047
-
(2009)
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09)
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
40
-
-
0000369806
-
Some applications of Rabin's fingerprinting method
-
New York, NY, USA Springer
-
Broder A., Some applications of Rabin's fingerprinting method. Sequences II 1993 New York, NY, USA Springer 143 152
-
(1993)
Sequences II
, pp. 143-152
-
-
Broder, A.1
|