-
3
-
-
33751508709
-
Recommendation for Key Management-Part 1: General (Revision 3)
-
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management-Part 1: General (Revision 3). Tech. rep., National Institute of Standards and Technology (2012)
-
(2012)
Tech. Rep., National Institute of Standards and Technology
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
4
-
-
38049045519
-
Conjunctive, Subset, and Range Queries on Encrypted Data
-
S.P. Vadhan (ed.), Springer
-
Boneh, D., Waters, B.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: S.P. Vadhan (ed.) Theory of Cryptography, Lecture Notes in Computer Science, vol. 4392. Springer (2007)
-
(2007)
Theory of Cryptography, Lecture Notes in Computer Science
, vol.4392
-
-
Boneh, D.1
Waters, B.2
-
6
-
-
80053596395
-
Twin Clouds: Secure Cloud Computing with Low Latency
-
B. Decker, J. Lapon, V. Naessens, A. Uhl (eds.), Springer
-
Bugiel, S., Nürnberger, S., Sadeghi, A.R., Schneider, T.: Twin Clouds: Secure Cloud Computing with Low Latency. In: B. Decker, J. Lapon, V. Naessens, A. Uhl (eds.) Communications and Multimedia Security, Lecture Notes in Computer Science, vol. 7025. Springer (2011)
-
(2011)
Communications and Multimedia Security, Lecture Notes in Computer Science
, vol.7025
-
-
Bugiel, S.1
Nürnberger, S.2
Sadeghi, A.R.3
Schneider, T.4
-
8
-
-
74049093526
-
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW) (2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW)
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
9
-
-
33745212646
-
Performance Analysis of TLS Web servers
-
Coarfa, C., Druschel, P., Wallach, D.S.: Performance Analysis of TLS Web servers. ACM Trans. Comput. Syst. 24(1) (2006)
-
(2006)
ACM Trans. Comput. Syst
, vol.24
, Issue.1
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.S.3
-
10
-
-
70450170255
-
The application/json Media Type for JavaScript Object Notation (JSON)
-
Crockford, D.: The application/json Media Type for JavaScript Object Notation (JSON). RFC 4627 (2006)
-
(2006)
RFC
, pp. 4627
-
-
Crockford, D.1
-
13
-
-
84899962224
-
-
Tech. rep., RWTH Aachen University
-
Eggert, M., Häußling, R., Henze, M., Hermerschmidt, L., Hummen, R., Kerpen, D., Navarro Pérez, A., Rumpe, B., Thißen, D., Wehrle, K.: SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators. Tech. rep., RWTH Aachen University (2013)
-
(2013)
Sensorcloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
-
-
Eggert, M.1
Häußling, R.2
Henze, M.3
Hermerschmidt, L.4
Hummen, R.5
Kerpen, D.6
Navarro Pérez, A.7
Rumpe, B.8
Thißen, D.9
Wehrle, K.10
-
15
-
-
77649240581
-
Computing Arbitrary Functions of Encrypted Data
-
Gentry, C.: Computing Arbitrary Functions of Encrypted Data. Commun. ACM 53(3) (2010)
-
(2010)
Commun. ACM
, vol.53
, Issue.3
-
-
Gentry, C.1
-
16
-
-
84890883068
-
GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code
-
Guarnieri, S., Livshits, B.: GATEKEEPER: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In: 18th USENIX Security Symposium (USENIX Security) (2009)
-
(2009)
18Th USENIX Security Symposium (USENIX Security)
-
-
Guarnieri, S.1
Livshits, B.2
-
18
-
-
67650233718
-
Secure Wi-FiSharing at Global Scales
-
Heer, T., Götz, S., Weingärtner, E., Wehrle, K.: Secure Wi-FiSharing at Global Scales. In: International Conference on Telecommunications (ICT) (2008)
-
(2008)
International Conference on Telecommunications (ICT)
-
-
Heer, T.1
Götz, S.2
Weingärtner, E.3
Wehrle, K.4
-
19
-
-
84899734851
-
Towards Data Handling Requirements-aware Cloud Computing
-
Henze, M., Großfengels, M., Koprowski, M., Wehrle, K.: Towards Data Handling Requirements-aware Cloud Computing. In: 2013 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2013)
-
(2013)
2013 IEEE International Conference on Cloud Computing Technology and Science (Cloudcom)
-
-
Henze, M.1
Großfengels, M.2
Koprowski, M.3
Wehrle, K.4
-
20
-
-
85001608959
-
Maintaining User Control While Storing and Processing Sensor Data in the Cloud
-
Henze, M., Hummen, R., Matzutt, R., Catrein, D., Wehrle, K.: Maintaining User Control While Storing and Processing Sensor Data in the Cloud. International Journal of Grid and High Performance Computing (IJGHPC) 5(4) (2013)
-
(2013)
International Journal of Grid and High Performance Computing (IJGHPC)
, vol.5
, Issue.4
-
-
Henze, M.1
Hummen, R.2
Matzutt, R.3
Catrein, D.4
Wehrle, K.5
-
22
-
-
84874277715
-
A Cloud Design for User-controlled Storage and Processing of Sensor Data
-
Hummen, R., Henze, M., Catrein, D., Wehrle, K.: A Cloud Design for User-controlled Storage and Processing of Sensor Data. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom) (2012)
-
(2012)
2012 IEEE 4Th International Conference on Cloud Computing Technology and Science (Cloudcom)
-
-
Hummen, R.1
Henze, M.2
Catrein, D.3
Wehrle, K.4
-
23
-
-
84891683415
-
Slimfit-A HIP DEX Compression Layer for the IP-based Internet of Things
-
Hummen, R., Hiller, J., Henze, M., Wehrle, K.: Slimfit-A HIP DEX Compression Layer for the IP-based Internet of Things. In: 1st International Workshop on Internet of Things Communications and Technologies (IoT) (2013)
-
(2013)
1St International Workshop on Internet of Things Communications and Technologies (Iot)
-
-
Hummen, R.1
Hiller, J.2
Henze, M.3
Wehrle, K.4
-
24
-
-
84879533211
-
6LoWPAN Fragmentation Attacks and Mitigation Mechanisms
-
Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN Fragmentation Attacks and Mitigation Mechanisms. In: Proceedings of the sixth ACM Conference on Security and privacy in Wireless and Mobile Networks (WiSec) (2013)
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (Wisec)
-
-
Hummen, R.1
Hiller, J.2
Wirtz, H.3
Henze, M.4
Shafagh, H.5
Wehrle, K.6
-
25
-
-
84921046600
-
Delegation-based authentication and authorization for the ip-based internet of things
-
Hummen, R., Shafagh, H., Raza, S., Voigt, T., Wehrle, K.: Delegation-based authentication and authorization for the ip-based internet of things. In: 2014 IEEE International Conference on Sensing, Communications and Networking (SECON) (2014)
-
(2014)
2014 IEEE International Conference on Sensing, Communications and Networking (SECON)
-
-
Hummen, R.1
Shafagh, H.2
Raza, S.3
Voigt, T.4
Wehrle, K.5
-
26
-
-
84896743669
-
Tailoring End-to-End IP Security Protocols to the Internet of Things
-
Hummen, R., Wirtz, H., Ziegeldorf, J.H., Hiller, J., Wehrle, K.: Tailoring End-to-End IP Security Protocols to the Internet of Things. In: 21st IEEE International Conference on Network Protocols (ICNP) (2013)
-
(2013)
21St IEEE International Conference on Network Protocols (ICNP)
-
-
Hummen, R.1
Wirtz, H.2
Ziegeldorf, J.H.3
Hiller, J.4
Wehrle, K.5
-
27
-
-
77950587463
-
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
-
Itani, W., Kayssi, A., Chehab, A.: Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC) (2009)
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC)
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
29
-
-
77956137294
-
Cryptographic Cloud Storage
-
R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Sebé (eds.), Springer
-
Kamara, S., Lauter, K.: Cryptographic Cloud Storage. In: R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, F. Sebé (eds.) Financial Cryptography and Data Security, Lecture Notes in Computer Science, vol. 6054. Springer (2010)
-
(2010)
Financial Cryptography and Data Security, Lecture Notes in Computer Science
, vol.6054
-
-
Kamara, S.1
Lauter, K.2
-
30
-
-
79955764516
-
-
IETF RFC 5996 (Proposed Standard)
-
Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet Key Exchange Protocol Version 2 (IKEv2). IETF RFC 5996 (Proposed Standard) (2010)
-
(2010)
Internet Key Exchange Protocol Version 2 (Ikev2)
-
-
Kaufman, C.1
Hoffman, P.2
Nir, Y.3
Eronen, P.4
-
32
-
-
64249101946
-
A Proof of Security of Yao’s Protocol for Two-Party Computation
-
Lindell, Y., Pinkas, B.: A Proof of Security of Yao’s Protocol for Two-Party Computation. Journal of Cryptology 22(2) (2009)
-
(2009)
Journal of Cryptology
, vol.22
, Issue.2
-
-
Lindell, Y.1
Pinkas, B.2
-
33
-
-
35348989745
-
Trusted Computing
-
Mitchell, C.J. (ed.): Trusted Computing. IEE (2005)
-
(2005)
IEE
-
-
Mitchell, C.J.1
-
34
-
-
46449128945
-
Transmission of IPv6 Packets over IEEE 802.15.4 Networks
-
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. RFC 4944 (2007)
-
(2007)
RFC
, pp. 4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
35
-
-
3142619105
-
-
IETF RFC 5201 (Experimental)
-
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. IETF RFC 5201 (Experimental) (2008)
-
(2008)
Host Identity Protocol
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
41
-
-
84863151459
-
End-to-End Policy-Based Encryption and Management of Data in the Cloud
-
Pearson, S., Mont, M.C., Chen, L., Reed, A.: End-to-End Policy-Based Encryption and Management of Data in the Cloud. In: 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom) (2011)
-
(2011)
2011 IEEE 3Rd International Conference on Cloud Computing Technology and Science (Cloudcom)
-
-
Pearson, S.1
Mont, M.C.2
Chen, L.3
Reed, A.4
-
42
-
-
82655162816
-
CryptDB: Protecting Confidentiality wiThencrypted Query Processing
-
Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: Protecting Confidentiality wiThencrypted Query Processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP ’11) (2011)
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP ’11)
-
-
Popa, R.A.1
Redfield, C.2
Zeldovich, N.3
Balakrishnan, H.4
-
47
-
-
85025679901
-
-
strongSwan-IPsec for Linux
-
The strongSwan Project: strongSwan-IPsec for Linux. online@http://strongswan.org (2013)
-
(2013)
-
-
The strongSwan Project1
-
48
-
-
84857166447
-
MyTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment
-
Wallom, D., Turilli, M., Taylor, G., Hargreaves, N., Martin, A., Raun, A., McMoran, A.: myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment. In: 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom) (2011)
-
(2011)
2011 IEEE 3Rd International Conference on Cloud Computing Technology and Science (Cloudcom)
-
-
Wallom, D.1
Turilli, M.2
Taylor, G.3
Hargreaves, N.4
Martin, A.5
Raun, A.6
McMoran, A.7
-
49
-
-
79953294892
-
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
-
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847-859 (2011)
-
(2011)
IEEE Trans. Parallel Distrib. Syst
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
51
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: 2010 Proceedings IEEE INFOCOM (2010)
-
(2010)
2010 Proceedings IEEE INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|