-
1
-
-
84904461949
-
Hvsto: Efficient privacy preserving hybrid storage in cloud data center
-
Dong, M., Li, H., Ota, K., Zhu, H.: Hvsto: efficient privacy preserving hybrid storage in cloud data center. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014), pp. 529–534 (2014)
-
(2014)
IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2014)
, pp. 529-534
-
-
Dong, M.1
Li, H.2
Ota, K.3
Zhu, H.4
-
2
-
-
84925082806
-
Multicloud-based evacuation services for emergency management
-
Dong, M., Li, H., Ota, K., Yang, L.T., Zhu, H.: Multicloud-based evacuation services for emergency management. IEEE Cloud Comput. 1(4), 50–59 (2014)
-
(2014)
IEEE Cloud Comput
, vol.1
, Issue.4
, pp. 50-59
-
-
Dong, M.1
Li, H.2
Ota, K.3
Yang, L.T.4
Zhu, H.5
-
3
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
-
(2014)
Inf. Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
4
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
-
(2013)
IEEE Trans. Comput
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
5
-
-
84904430603
-
Efficient public integrity checking for cloud data sharing with multi-user modification
-
Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM 2014, pp. 2121–2129 (2014)
-
(2014)
INFOCOM 2014
, pp. 2121-2129
-
-
Yuan, J.1
Yu, S.2
-
6
-
-
84858316020
-
Computing on authenticated data
-
In: Cramer, R. (ed.), Springer, Heidelberg
-
Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1–20. Springer, Heidelberg (2012)
-
(2012)
TCC 2012. LNCS
, vol.7194
, pp. 1-20
-
-
Ahn, J.H.1
Boneh, D.2
Camenisch, J.3
Hohenberger, S.4
Shelat, A.5
Waters, B.6
-
7
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
Jia, W., Zhu, H., Cao, Z., Wei, L., Lin, X.: SDSM: a secure data service mechanism in mobile cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2011), pp. 1060–1065 (2011)
-
(2011)
IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS 2011)
, pp. 1060-1065
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
8
-
-
84855426977
-
Secure proxy signature schemes for delegation of signing rights
-
Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)
-
(2012)
J. Cryptology
, vol.25
, Issue.1
, pp. 57-115
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
9
-
-
84944905011
-
Homomorphic signature schemes
-
In: Preneel, B. (ed.), Springer, Heidelberg
-
Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
-
(2002)
CT-RSA 2002. LNCS
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
10
-
-
84891911238
-
A new definition of homomorphic signature for identity management in mobile cloud computing
-
Wang, Z., Sun, G., Chen, D.: A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3), 546–553 (2014)
-
(2014)
J. Comput. Syst. Sci
, vol.80
, Issue.3
, pp. 546-553
-
-
Wang, Z.1
Sun, G.2
Chen, D.3
-
11
-
-
84893546633
-
Flexible and publicly verifiable aggregation query for outsourced databases in cloud
-
Yuan, J., Yu, S.: Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: IEEE CNS 2013, pp. 520–524 (2013)
-
(2013)
IEEE CNS 2013
, pp. 520-524
-
-
Yuan, J.1
Yu, S.2
-
12
-
-
57849092101
-
A secure identity-based multi-proxy signature scheme
-
Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)
-
(2009)
Comput. Electr. Eng
, vol.35
, Issue.1
, pp. 86-95
-
-
Cao, F.1
Cao, Z.2
-
13
-
-
84921874319
-
Provable secure identity-based multi-proxy signature scheme
-
Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28(3), 497–512 (2015)
-
(2015)
Int. J. Commun. Syst
, vol.28
, Issue.3
, pp. 497-512
-
-
Sahu, R.A.1
Padhye, S.2
-
15
-
-
84863270684
-
Provably secure and efficient identity-based signature scheme based on cubic residues
-
Wang, Z., Wang, L., Zheng, S., Yang, Y., Hu, Z.: Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 14(1), 33–38 (2012)
-
(2012)
Int. J. Netw. Secur
, vol.14
, Issue.1
, pp. 33-38
-
-
Wang, Z.1
Wang, L.2
Zheng, S.3
Yang, Y.4
Hu, Z.5
-
16
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme without bilinear pairings
-
He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)
-
(2012)
Int. J. Commun. Syst
, vol.25
, Issue.11
, pp. 1432-1442
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
17
-
-
27144534222
-
Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
-
Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)
-
(2005)
Appl. Math. Comput
, vol.169
, Issue.1
, pp. 437-450
-
-
Li, X.1
Chen, K.2
-
18
-
-
78650034291
-
Identity-based aggregate and multi-signature schemes based on RSA
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
-
Bagherzandi, A., Jarecki, S.: Identity-based aggregate and multi-signature schemes based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 480–498. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 480-498
-
-
Bagherzandi, A.1
Jarecki, S.2
-
19
-
-
84883376529
-
Efficient cryptosystems from 2k-th power residue symbols
-
In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
-
Joye, M., Libert, B.: Efficient cryptosystems from 2k-th power residue symbols. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 76–92. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 76-92
-
-
Joye, M.1
Libert, B.2
|