-
1
-
-
84928143974
-
Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency
-
in press
-
Chia-Mu Yu, Chi-Yuan Chen and Han-Chieh Chao, Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency, IEEE Network Magazine, in press.
-
IEEE Network Magazine
-
-
Yu, C.-M.1
Chen, C.-Y.2
Chao, H.-C.3
-
2
-
-
84922280033
-
Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
-
Zhang-Jie Fu, Xing-Ming Sun, Qi Liu, Lu Zhou and Jian-Gang Shu, Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing, IEICE Transactions on Communications, Vol.E98-B, No.1, 2015, pp.190-200.
-
(2015)
IEICE Transactions on Communications
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.-J.1
Sun, X.-M.2
Liu, Q.3
Zhou, L.4
Shu, J.-G.5
-
3
-
-
84876134245
-
Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks
-
Jin Wang, Yue Yin, Jian-Wei Zhang, Sungyoung Lee and R. Simon Sherratt, Mobility Based Energy Efficient and Multi-sink Algorithms for Consumer Home Networks, IEEE Transactions on Consumer Electronics, Vol.59, No.1, 2013, pp.77-84.
-
(2013)
IEEE Transactions on Consumer Electronics
, vol.59
, Issue.1
, pp. 77-84
-
-
Wang, J.1
Yin, Y.2
Zhang, J.-W.3
Lee, S.4
Sherratt, R.S.5
-
4
-
-
84890369044
-
An Efficient Verifiably Encrypted Signature from Weil Pairing
-
Jian Shen, Wen-Ying Zheng, Jin Wang, Yu-Hui Zheng and Xing-Ming Sun, An Efficient Verifiably Encrypted Signature from Weil Pairing, Journal of Internet Technology, Vol.14, No.6, 2013, pp.947-952.
-
(2013)
Journal of Internet Technology
, vol.14
, Issue.6
, pp. 947-952
-
-
Shen, J.1
Zheng, W.-Y.2
Wang, J.3
Zheng, Y.-H.4
Sun, X.-M.5
-
5
-
-
84886466907
-
An Energy Efficient Stable Election-Based Routing Algorithm for Wireless Sensor Networks
-
Jin Wang, Zhong-Qi Zhang, Feng Xia, Wei-Wei Yuan and Sungyoung Lee, An Energy Efficient Stable Election-Based Routing Algorithm for Wireless Sensor Networks, Sensors, Vol.13, No.11, 2013, pp.14301-14320.
-
(2013)
Sensors
, vol.13
, Issue.11
, pp. 14301-14320
-
-
Wang, J.1
Zhang, Z.-Q.2
Xia, F.3
Yuan, W.-W.4
Lee, S.5
-
6
-
-
84922280902
-
Segmentation-Based Image Copy-Move Forgery Detection Scheme
-
Jian Li, Xiao-Long Li, Bin Yang and Xing-Ming Sun, Segmentation-Based Image Copy-Move Forgery Detection Scheme, IEEE Transactions on Information Forensics and Security, Vol.10, No.3, 2015, pp.507-518.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.3
, pp. 507-518
-
-
Li, J.1
Li, X.-L.2
Yang, B.3
Sun, X.-M.4
-
7
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson and Dawn Song, Provable Data Possession at Untrusted Stores, Proc. ACM CCS, Alexandria, VA, November, 2007, pp.598-609.
-
Proc. ACM CCS, Alexandria, VA, November, 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
74049103479
-
PORs: Proofs of Retrievability for Large Files
-
Ari Juels and Burton S. Kaliski, Jr., PORs: Proofs of Retrievability for Large Files, Proc. ACM CCS, Alexandria, VA, November, 2007, pp.584-597.
-
Proc. ACM CCS, Alexandria, VA, November, 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
9
-
-
84878998883
-
Compact Proofs of Retrievability
-
Hovav Shacham and Brent Waters, Compact Proofs of Retrievability, Journal of Cryptology, Vol.26, No.3, 2013, pp.442-483.
-
(2013)
Journal of Cryptology
, vol.26
, Issue.3
, pp. 442-483
-
-
Shacham, H.1
Waters, B.2
-
10
-
-
74049121230
-
Dynamic Provable Data Possession
-
C. Chris Erway, Alptekin Kupcu, Charalampos Papamanthou and Roberto Tamassia, Dynamic Provable Data Possession, Proc. ACM CCS, Chicago, IL, November, 2009, pp.213-222.
-
Proc. ACM CCS, Chicago, IL, November, 2009
, pp. 213-222
-
-
Erway, C.C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
11
-
-
79953294892
-
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
-
Qian Wang, Cong Wang, Kui Ren, Wen-Jing Lou and Jin Li, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.5, 2011, pp.847-859.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.-J.4
Li, J.5
-
12
-
-
84880921984
-
Feasibility and Finite Convergence Analysis for Accurate On-Line ν-Support Vector Learning
-
Bin Gu and Victor S. Sheng, Feasibility and Finite Convergence Analysis for Accurate On-Line ν-Support Vector Learning, IEEE Transactions on Neural Networks and Learning Systems, Vol.24, No.8, 2013, pp.1304-1315.
-
(2013)
IEEE Transactions on Neural Networks and Learning Systems
, vol.24
, Issue.8
, pp. 1304-1315
-
-
Gu, B.1
Sheng, V.S.2
-
13
-
-
81055144591
-
Delegable Provable Data Possession for Remote Data in the Clouds
-
Shiuan-Tzuo Shen and Wen-Guey Tzeng, Delegable Provable Data Possession for Remote Data in the Clouds, Proc. of ICICS, Beijing, China, November, 2011, pp.93-111.
-
Proc. of ICICS, Beijing, China, November, 2011
, pp. 93-111
-
-
Shen, S.-T.1
Tzeng, W.-G.2
-
14
-
-
84890471117
-
Proxy Provable Data Possession in Public Clouds
-
Huaqun Wang, Proxy Provable Data Possession in Public Clouds, IEEE Transactions on Services Computing, Vol.6, No.4, 2012, pp.551-559.
-
(2012)
IEEE Transactions on Services Computing
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
15
-
-
84921633354
-
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage
-
Yong-Jun Ren, Jian Shen, Jin Wang and Li-Ming Fang, Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage, Proc. IIH-MSP, Kitakyushu, Japan, August, 2014, pp.779-782.
-
Proc. IIH-MSP, Kitakyushu, Japan, August, 2014
, pp. 779-782
-
-
Ren, Y.-J.1
Shen, J.2
Wang, J.3
Fang, L.-M.4
|