메뉴 건너뛰기




Volumn 46, Issue , 2015, Pages 689-696

Enhanced attribute based encryption for cloud computing

Author keywords

Attribute based Encryption; Cloud computing; Privacy; Security

Indexed keywords

CLIMATE CHANGE; DATA PRIVACY; HASH FUNCTIONS;

EID: 84931323937     PISSN: None     EISSN: 18770509     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2015.02.127     Document Type: Conference Paper
Times cited : (40)

References (15)
  • 1
    • 84871003529 scopus 로고    scopus 로고
    • A survey on service-oriented network virtualization toward convergence of networking and cloud computing
    • IEEE Transactions on 392
    • Qiang Duan, Yuhong Yan, Vasilakos, AV. A Survey on Service-Oriented Network Virtualization Toward Convergence of Networking and Cloud Computing Network and Service Management, IEEE Transactions on, Vol. 9, no. 4, pp. 373, 392.
    • Network and Service Management , vol.9 , Issue.4 , pp. 373
    • Duan, Q.1    Yan, Y.2    Vasilakos, A.V.3
  • 2
    • 84888403853 scopus 로고    scopus 로고
    • Applying encryption algorithm for data security and privacy in cloud
    • Computing by No 1, January
    • Computing by Mohit Marwaha1, Rajeev Bedi. Applying Encryption Algorithm for Data Security and Privacy in Cloud in International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013.
    • (2013) International Journal of Computer Science Issues , vol.10 , Issue.1
    • Marwaha, M.1    Bedi, R.2
  • 4
    • 77949632117 scopus 로고    scopus 로고
    • Quantification of security for compute intensive workloads in clouds
    • 2009 15th International Conference on 486, 8-11 Dec.
    • Arshad, J, Townend, P, Jie Xu. Quantification of Security for Compute Intensive Workloads in Clouds Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on, vol., no., pp. 479, 486, 8-11 Dec. 2009.
    • (2009) Parallel and Distributed Systems (ICPADS) , pp. 479
    • Arshad, J.1    Townend, P.2    Xu, J.3
  • 5
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • A. Sahai and B. Waters. Fuzzy identity-based encryption, in Proc. EUROCRYPT, 2005, pp. 457-473.
    • (2005) Proc. EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 7
    • 84880652100 scopus 로고    scopus 로고
    • Attribute-based encryption with verifiable outsourced decryption
    • IEEE Transactions on 1354, Aug.
    • Junzuo Lai, Deng, R.H, Chaowen Guan, Jian Weng. Attribute-Based Encryption With Verifiable Outsourced Decryption Information Forensics and Security, IEEE Transactions on, Vol. 8, no. 8, pp. 1343, 1354, Aug. 2013.
    • (2013) Information Forensics and Security , vol.8 , Issue.8 , pp. 1343
    • Lai, J.1    Deng, R.H.2    Guan, C.3    Weng, J.4
  • 8
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization in Proc. Public Key Cryptography, 2011, pp. 53-70.
    • (2011) Proc. Public Key Cryptography , pp. 53-70
    • Waters, B.1
  • 11
    • 85030377373 scopus 로고    scopus 로고
    • Dropbox news. https://www.dropbox.com/news.
  • 13
    • 79959571613 scopus 로고    scopus 로고
    • On cryptographic protocols employing asymmetric pairings - The role of revisited
    • S. Chatterjee and A. Menezes. On cryptographic protocols employing asymmetric pairings-The role of revisited, Discrete Appl. Math., Vol. 159, no. 13, pp. 1311-1322, 2011.
    • (2011) Discrete Appl. Math. , vol.159 , Issue.13 , pp. 1311-1322
    • Chatterjee, S.1    Menezes, A.2
  • 15
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • Tal Rabin (Ed.). Springer-Verlag, Berlin, Heidelberg
    • Rosario Gennaro, Craig Gentry, and Bryan Parno. 2010. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In Proceedings of the 30th annual conference on Advances in cryptology (CRYPTO'10), Tal Rabin (Ed.). Springer-Verlag, Berlin, Heidelberg, 465-482
    • (2010) Proceedings of the 30th Annual Conference on Advances in Cryptology (CRYPTO'10) , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.