-
1
-
-
84871003529
-
A survey on service-oriented network virtualization toward convergence of networking and cloud computing
-
IEEE Transactions on 392
-
Qiang Duan, Yuhong Yan, Vasilakos, AV. A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing Network and Service Management, IEEE Transactions on, Vol. 9, no. 4, pp. 373, 392.
-
Network and Service Management
, vol.9
, Issue.4
, pp. 373
-
-
Duan, Q.1
Yan, Y.2
Vasilakos, A.V.3
-
2
-
-
84888403853
-
Applying encryption algorithm for data security and privacy in cloud
-
Computing by No 1, January
-
Computing by Mohit Marwaha1, Rajeev Bedi. Applying Encryption Algorithm for Data Security and Privacy in Cloud in International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.
-
(2013)
International Journal of Computer Science Issues
, vol.10
, Issue.1
-
-
Marwaha, M.1
Bedi, R.2
-
4
-
-
77949632117
-
Quantification of security for compute intensive workloads in clouds
-
2009 15th International Conference on 486, 8-11 Dec.
-
Arshad, J, Townend, P, Jie Xu. Quantification of Security for Compute Intensive Workloads in Clouds Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on, vol., no., pp. 479, 486, 8-11 Dec. 2009.
-
(2009)
Parallel and Distributed Systems (ICPADS)
, pp. 479
-
-
Arshad, J.1
Townend, P.2
Xu, J.3
-
5
-
-
24944554962
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters. Fuzzy identity-based encryption, in Proc. EUROCRYPT, 2005, pp. 457-473.
-
(2005)
Proc. EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
6
-
-
74049133176
-
Cloud security is not (just) virtualization security: A short paper
-
ACM, New York, NY, USA
-
Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales, Daniele Sgandurra, and Diego Zamboni. 2009. Cloud security is not (just) virtualization security: a short paper. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). ACM, New York, NY, USA, 97-102.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW '09)
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
7
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
IEEE Transactions on 1354, Aug.
-
Junzuo Lai, Deng, R.H, Chaowen Guan, Jian Weng. Attribute-Based Encryption With Verifiable Outsourced Decryption Information Forensics and Security, IEEE Transactions on, Vol. 8, no. 8, pp. 1343, 1354, Aug. 2013.
-
(2013)
Information Forensics and Security
, vol.8
, Issue.8
, pp. 1343
-
-
Lai, J.1
Deng, R.H.2
Guan, C.3
Weng, J.4
-
8
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization in Proc. Public Key Cryptography, 2011, pp. 53-70.
-
(2011)
Proc. Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
9
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM, New York, NY, USA
-
Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (CCS '06). ACM, New York, NY, USA, 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
85076484262
-
Outsourcing the decryption of ABE ciphertexts
-
USENIX Association, Berkeley, CA, USA
-
Matthew Green, Susan Hohenberger, and Brent Waters. 2011. Outsourcing the decryption of ABE ciphertexts. In Proceedings of the 20th USENIX conference on Security (SEC'11). USENIX Association, Berkeley, CA, USA, 34-34.
-
(2011)
Proceedings of the 20th USENIX Conference on Security (SEC'11)
, pp. 34-34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
11
-
-
85030377373
-
-
Dropbox news. https://www.dropbox.com/news.
-
-
-
-
12
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM, New York, NY, USA
-
Rafail Ostrovsky, Amit Sahai, and Brent Waters. 2007. Attribute-based encryption with non-monotonic access structures. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 195-203.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07)
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
13
-
-
79959571613
-
On cryptographic protocols employing asymmetric pairings - The role of revisited
-
S. Chatterjee and A. Menezes. On cryptographic protocols employing asymmetric pairings-The role of revisited, Discrete Appl. Math., Vol. 159, no. 13, pp. 1311-1322, 2011.
-
(2011)
Discrete Appl. Math.
, vol.159
, Issue.13
, pp. 1311-1322
-
-
Chatterjee, S.1
Menezes, A.2
-
14
-
-
38149111147
-
Batch pairing delegation
-
Atsuko Miyaji, Hiroaki Kikuchi, and Kai Rannenberg (Eds.). Springer-Verlag, Berlin, Heidelberg
-
Patrick P. Tsang, Sherman S. M. Chow, and Sean W. Smith. 2007. Batch pairing delegation. In Proceedings of the Security 2nd international conference on Advances in information and computer security (IWSEC'07), Atsuko Miyaji, Hiroaki Kikuchi, and Kai Rannenberg (Eds.). Springer-Verlag, Berlin, Heidelberg, 74-90.
-
(2007)
Proceedings of the Security 2nd International Conference on Advances in Information and Computer Security (IWSEC'07)
, pp. 74-90
-
-
Tsang, P.P.1
Chow, S.S.M.2
Smith, S.W.3
-
15
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Tal Rabin (Ed.). Springer-Verlag, Berlin, Heidelberg
-
Rosario Gennaro, Craig Gentry, and Bryan Parno. 2010. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In Proceedings of the 30th annual conference on Advances in cryptology (CRYPTO'10), Tal Rabin (Ed.). Springer-Verlag, Berlin, Heidelberg, 465-482
-
(2010)
Proceedings of the 30th Annual Conference on Advances in Cryptology (CRYPTO'10)
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
|