-
2
-
-
84958202773
-
SeDaSC: secure data sharing in clouds
-
[2] Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos, A.V., Li, K., Zomaya, A.Y., SeDaSC: secure data sharing in clouds. IEEE Syst. J. PP (2015), 1–10.
-
(2015)
IEEE Syst. J.
, vol.PP
, pp. 1-10
-
-
Ali, M.1
Dhamotharan, R.2
Khan, E.3
Khan, S.U.4
Vasilakos, A.V.5
Li, K.6
Zomaya, A.Y.7
-
3
-
-
84924368818
-
Security in cloud computing: opportunities and challenges
-
[3] Ali, M., Khan, S.U., Vasilakos, A.V., Security in cloud computing: opportunities and challenges. Inf. Sci. 305 (2015), 357–383.
-
(2015)
Inf. Sci.
, vol.305
, pp. 357-383
-
-
Ali, M.1
Khan, S.U.2
Vasilakos, A.V.3
-
4
-
-
77950347409
-
Above the clouds: a view of cloud computing
-
[4] Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Above the clouds: a view of cloud computing. Commun. ACM 53 (2010), 50–58.
-
(2010)
Commun. ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
5
-
-
84893233677
-
The 15 Worst Data Security Breaches of the 21st Century
-
[5] T. Armerding, The 15 Worst Data Security Breaches of the 21st Century, in: COS Security and Risk, csoonline, 2012.
-
(2012)
COS Security and Risk, csoonline
-
-
Armerding, T.1
-
6
-
-
79959823910
-
Remote data checking using provable data possession
-
[6] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D., Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14 (2011), 1–34.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, pp. 1-34
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
7
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM Alexandria, Virginia, USA
-
[7] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D., Provable data possession at untrusted stores. Proceedings of the fourteenth ACM Conference on Computer and Communications Security, 2007, ACM, Alexandria, Virginia, USA, 598–609.
-
(2007)
Proceedings of the fourteenth ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM Istanbul, Turkey
-
[8] Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G., Scalable and efficient provable data possession. Proceedings of the Fourth International Conference on Security and Privacy in Communication Networks, 2008, ACM, Istanbul, Turkey, 1–10.
-
(2008)
Proceedings of the Fourth International Conference on Security and Privacy in Communication Networks
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
9
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Springer Berlin Heidelberg
-
[9] Boneh, D., Gentry, C., Lynn, B., Shacham, H., Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology (EUROCRYPT), 2003, Springer, Berlin Heidelberg, 416–432.
-
(2003)
Advances in Cryptology (EUROCRYPT)
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
10
-
-
14844309671
-
Group signatures with verifier-local revocation
-
ACM Washington DC, USA
-
[10] Boneh, D., Shacham, H., Group signatures with verifier-local revocation. Proceedings of the eleventh ACM conference on Computer and communications security, 2004, ACM, Washington DC, USA, 168–177.
-
(2004)
Proceedings of the eleventh ACM conference on Computer and communications security
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
11
-
-
84922828826
-
Panda: public auditing for shared data with efficient user revocation in the cloud
-
[11] Boyang, W., Baochun, L., Hui, L., Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8 (2015), 92–106.
-
(2015)
IEEE Trans. Serv. Comput.
, vol.8
, pp. 92-106
-
-
Boyang, W.1
Baochun, L.2
Hui, L.3
-
12
-
-
0000369806
-
Some applications of Rabin's fingerprinting method
-
Springer New York
-
[12] Broder, A., Some applications of Rabin's fingerprinting method. Sequences II, 1993, Springer, New York, 143–152.
-
(1993)
Sequences II
, pp. 143-152
-
-
Broder, A.1
-
13
-
-
63649117166
-
Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
-
[13] Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I., Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25 (2009), 599–616.
-
(2009)
Future Gener. Comput. Syst.
, vol.25
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
15
-
-
84873952327
-
Algebraic (Trapdoor) one-way functions and their applications
-
A. Sahai Springer Berlin Heidelberg
-
[15] Catalano, D., Fiore, D., Gennaro, R., Vamvourellis, K., Algebraic (Trapdoor) one-way functions and their applications. Sahai, A., (eds.) Theory of Cryptography, 2013, Springer, Berlin Heidelberg, 680–699.
-
(2013)
Theory of Cryptography
, pp. 680-699
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
Vamvourellis, K.4
-
16
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
ACM Chicago, Illinois, USA
-
[16] Chen, B., Curtmola, R., Ateniese, G., Burns, R., Remote data checking for network coding-based distributed storage systems. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, 2010, ACM, Chicago, Illinois, USA, 31–42.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
17
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
[17] Cong, W., Kui, R., Wenjing, L., Jin, L., Toward publicly auditable secure cloud data storage services. IEEE Netw. 24 (2010), 19–24.
-
(2010)
IEEE Netw.
, vol.24
, pp. 19-24
-
-
Cong, W.1
Kui, R.2
Wenjing, L.3
Jin, L.4
-
18
-
-
84901587988
-
Uncheatable grid computing
-
Chapman & Hall/CRC Hachioji, Tokyo, Japan pp. 30-30
-
[18] Du, W., Murugesan, M., Jia, J., Uncheatable grid computing. Twenty-fourth International Conference on Distributed Computing Systems, 2010, Chapman & Hall/CRC, Hachioji, Tokyo, Japan pp. 30-30.
-
(2010)
Twenty-fourth International Conference on Distributed Computing Systems
-
-
Du, W.1
Murugesan, M.2
Jia, J.3
-
19
-
-
74049121230
-
Dynamic provable data possession
-
ACM Chicago, Illinois, USA
-
[19] Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R., Dynamic provable data possession. Proceedings of the sixteenth ACM Conference on Computer and Communications Security, 2009, ACM, Chicago, Illinois, USA, 213–222.
-
(2009)
Proceedings of the sixteenth ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
20
-
-
84929164643
-
Dynamic provable data possession
-
[20] Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R., Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17 (2015), 1–29.
-
(2015)
ACM Trans. Inf. Syst. Secur.
, vol.17
, pp. 1-29
-
-
Erway, C.C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
21
-
-
84891627095
-
Managing performance overhead of virtual machines in cloud computing: a survey, state of the art, and future directions
-
[21] Fei, X., Fangming, L., Hai, J., Vasilakos, A.V., Managing performance overhead of virtual machines in cloud computing: a survey, state of the art, and future directions. Proc. IEEE 102 (2014), 11–31.
-
(2014)
Proc. IEEE
, vol.102
, pp. 11-31
-
-
Fei, X.1
Fangming, L.2
Hai, J.3
Vasilakos, A.V.4
-
22
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
[22] Goldreich, O., Ostrovsky, R., Software protection and simulation on oblivious RAMs. J. ACM 43 (1996), 431–473.
-
(1996)
J. ACM
, vol.43
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
23
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
[23] Goodrich, M.T., Tamassia, R., Schwerin, A., Implementation of an authenticated dictionary with skip lists and commutative hashing. Proceedings IEEE DARPA Information Survivability Conference & Exposition II (DISCEX '01)., Anaheim, CA, 2001, 68–82.
-
(2001)
Proceedings IEEE DARPA Information Survivability Conference & Exposition II (DISCEX '01)., Anaheim, CA
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
24
-
-
84860389117
-
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
-
[24] Huang, Q., Yang, G., Wong, D., Susilo, W., Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Secur. 10 (2011), 373–385.
-
(2011)
Int. J. Inf. Secur.
, vol.10
, pp. 373-385
-
-
Huang, Q.1
Yang, G.2
Wong, D.3
Susilo, W.4
-
25
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
ACM Seattle, Washington, United States
-
[25] Impagliazzo, R., Levin, L.A., Luby, M., Pseudo-random generation from one-way functions. Proceedings of the Twenty-First Annual ACM Symposium On Theory of Computing, 1989, ACM, Seattle, Washington, United States, 12–24.
-
(1989)
Proceedings of the Twenty-First Annual ACM Symposium On Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
26
-
-
84928139575
-
Enabling cloud storage auditing with key-exposure resistance
-
[26] Jia, Y., Kui, R., Cong, W., Varadharajan, V., Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensic Secur. 10 (2015), 1167–1179.
-
(2015)
IEEE Trans. Inf. Forensic Secur.
, vol.10
, pp. 1167-1179
-
-
Jia, Y.1
Kui, R.2
Cong, W.3
Varadharajan, V.4
-
27
-
-
84998615008
-
Public integrity auditing for shared dynamic cloud data with group user revocation
-
[27] Jiang, T., Chen, X., Ma, J., Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. PP (2015), 1–12.
-
(2015)
IEEE Trans. Comput.
, vol.PP
, pp. 1-12
-
-
Jiang, T.1
Chen, X.2
Ma, J.3
-
28
-
-
74049103479
-
PORs: proofs of retrievability for large files
-
ACM Alexandria, Virginia, USA
-
[28] Juels, A., Burton, J., Kaliski, S., PORs: proofs of retrievability for large files. Proceedings of the Fourteenth ACM Conference on Computer and Communications Security, 2007, ACM, Alexandria, Virginia, USA, 584–597.
-
(2007)
Proceedings of the Fourteenth ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Burton, J.2
Kaliski, S.3
-
29
-
-
79960627456
-
Survey on routing in data centers: insights and future directions
-
[29] Kai, C., Chengchen, H., Xin, Z., Kai, Z., Yan, C., Vasilakos, A.V., Survey on routing in data centers: insights and future directions. IEEE Netw. 25 (2011), 6–10.
-
(2011)
IEEE Netw.
, vol.25
, pp. 6-10
-
-
Kai, C.1
Chengchen, H.2
Xin, Z.3
Kai, Z.4
Yan, C.5
Vasilakos, A.V.6
-
30
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
[30] Khan, A., Kiah, M.L.M., Madani, S., Ali, M., Khan, A., Shamshirband, S., Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput. 68 (2014), 624–651.
-
(2014)
J Supercomput.
, vol.68
, pp. 624-651
-
-
Khan, A.1
Kiah, M.L.M.2
Madani, S.3
Ali, M.4
Khan, A.5
Shamshirband, S.6
-
31
-
-
84871533728
-
Proof of possession for cloud storage via Lagrangian interpolation techniques
-
L. Xu E. Bertino Y. Mu Springer Berlin Heidelberg
-
[31] Krzywiecki, Ł., Kutyłowski, M., Proof of possession for cloud storage via Lagrangian interpolation techniques. Xu, L., Bertino, E., Mu, Y., (eds.) Network and System Security, 2012, Springer, Berlin Heidelberg, 305–319.
-
(2012)
Network and System Security
, pp. 305-319
-
-
Krzywiecki, Ł.1
Kutyłowski, M.2
-
32
-
-
84962857221
-
Secure auditing and deduplicating data in cloud
-
[32] Li, J., Li, J., Xie, D., Cai, Z., Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. PP (2015), 1–11.
-
(2015)
IEEE Trans. Comput.
, vol.PP
, pp. 1-11
-
-
Li, J.1
Li, J.2
Xie, D.3
Cai, Z.4
-
33
-
-
84891588127
-
GreenDCN: a general framework for achieving energy efficiency in data center networks
-
[33] Lin, W., Fa, Z., Arjona Aroca, J., Vasilakos, A.V., Kai, Z., Chenying, H., Dan, L., Zhiyong, L., GreenDCN: a general framework for achieving energy efficiency in data center networks. IEEE J. Select. Areas Commun. 32 (2014), 4–15.
-
(2014)
IEEE J. Select. Areas Commun.
, vol.32
, pp. 4-15
-
-
Lin, W.1
Fa, Z.2
Arjona Aroca, J.3
Vasilakos, A.V.4
Kai, Z.5
Chenying, H.6
Dan, L.7
Zhiyong, L.8
-
34
-
-
84907750021
-
Energy-efficient flow scheduling and routing with hard deadlines in data center networks
-
[34] Lin, W., Fa, Z., Kai, Z., Vasilakos, A.V., Shaolei, R., Zhiyong, L., Energy-efficient flow scheduling and routing with hard deadlines in data center networks. Thirty-fourth IEEE International Conference on Distributed Computing Systems (ICDCS), Madrid, 2014, 248–257.
-
(2014)
Thirty-fourth IEEE International Conference on Distributed Computing Systems (ICDCS), Madrid
, pp. 248-257
-
-
Lin, W.1
Fa, Z.2
Kai, Z.3
Vasilakos, A.V.4
Shaolei, R.5
Zhiyong, L.6
-
36
-
-
84920380941
-
Protocols for public key cryptosystems
-
[36] Merkle, R.C., Protocols for public key cryptosystems. IEEE Symposium on Security and privacy, Oakland, CA, USA, 1980, 122–134.
-
(1980)
IEEE Symposium on Security and privacy, Oakland, CA, USA
, pp. 122-134
-
-
Merkle, R.C.1
-
37
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
[37] Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youseff, L., Zagorodnov, D., The eucalyptus open-source cloud-computing system. Nineth IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai, 2009, 124–131.
-
(2009)
Nineth IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
39
-
-
0025436383
-
Skip lists: a probabilistic alternative to balanced trees
-
[39] Pugh, W., Skip lists: a probabilistic alternative to balanced trees. Commun. ACM 33 (1990), 668–676.
-
(1990)
Commun. ACM
, vol.33
, pp. 668-676
-
-
Pugh, W.1
-
40
-
-
84898825587
-
Mobile cloud computing: a survey, state of art and future directions
-
[40] Rahimi, M.R., Ren, J., Liu, C., Vasilakos, A., Venkatasubramanian, N., Mobile cloud computing: a survey, state of art and future directions. Mobile Netw. Appl. 19 (2014), 133–143.
-
(2014)
Mobile Netw. Appl.
, vol.19
, pp. 133-143
-
-
Rahimi, M.R.1
Ren, J.2
Liu, C.3
Vasilakos, A.4
Venkatasubramanian, N.5
-
41
-
-
84874278922
-
MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture
-
[41] Rahimi, M.R., Venkatasubramanian, N., Mehrotra, S., Vasilakos, A.V., MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture. IEEE Fifth International Conference on Utility and Cloud Computing (UCC), 2012, 83–90.
-
(2012)
IEEE Fifth International Conference on Utility and Cloud Computing (UCC)
, pp. 83-90
-
-
Rahimi, M.R.1
Venkatasubramanian, N.2
Mehrotra, S.3
Vasilakos, A.V.4
-
42
-
-
84897741920
-
MuSIC: mobility-aware optimal service allocation in mobile cloud computing
-
[42] Rahimi, M.R., Venkatasubramanian, N., Vasilakos, A.V., MuSIC: mobility-aware optimal service allocation in mobile cloud computing. IEEE Sixth International Conference on Cloud Computing (CLOUD), Santa Clara, CA, 2013, 75–82.
-
(2013)
IEEE Sixth International Conference on Cloud Computing (CLOUD), Santa Clara, CA
, pp. 75-82
-
-
Rahimi, M.R.1
Venkatasubramanian, N.2
Vasilakos, A.V.3
-
43
-
-
77952962466
-
Finite field arithmetic for cryptography
-
[43] Savas, x., Ko, E., x00E, C.K., Finite field arithmetic for cryptography. IEEE Circuits Syst. Mag. 10 (2010), 40–56.
-
(2010)
IEEE Circuits Syst. Mag.
, vol.10
, pp. 40-56
-
-
Savas, X.1
Ko, E.2
x00E, C.K.3
-
44
-
-
33947694320
-
Store, forget, and check: using algebraic signatures to check remotely administered storage
-
pp. 12-12
-
[44] Schwarz, T.S.J., Miller, E.L., Store, forget, and check: using algebraic signatures to check remotely administered storage. Twenty-sixth IEEE International Conference on Distributed Computing Systems, 2006 pp. 12-12.
-
(2006)
Twenty-sixth IEEE International Conference on Distributed Computing Systems
-
-
Schwarz, T.S.J.1
Miller, E.L.2
-
45
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
[45] Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J., Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20 (2008), 1034–1038.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.J.5
-
46
-
-
58349118819
-
Compact proofs of retrievability
-
Springer Berlin, Heidelberg
-
[46] Shacham, H., Waters, B., Compact proofs of retrievability. Advances in Cryptology (ASIACRYPT), 2008, Springer, Berlin, Heidelberg, 90–107.
-
(2008)
Advances in Cryptology (ASIACRYPT)
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
47
-
-
84888388073
-
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
-
[47] Shamshirband, S., Anuar, N.B., Kiah, M.L.M., Patel, A., An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26 (2013), 2105–2127.
-
(2013)
Eng. Appl. Artif. Intell.
, vol.26
, pp. 2105-2127
-
-
Shamshirband, S.1
Anuar, N.B.2
Kiah, M.L.M.3
Patel, A.4
-
48
-
-
84930646829
-
Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues
-
[48] Sookhak, M., Gani, A., Talebian, H., Khan, S.U., Buyya, R., Zomaya, A.Y., Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47 (2015), 1–34.
-
(2015)
ACM Comput. Surv.
, vol.47
, pp. 1-34
-
-
Sookhak, M.1
Gani, A.2
Talebian, H.3
Khan, S.U.4
Buyya, R.5
Zomaya, A.Y.6
-
49
-
-
84901607854
-
A review on remote data auditing in single cloud server: taxonomy and open issues
-
[49] Sookhak, M., Talebian, H., Ahmed, E., Gani, A., Khan, M.K., A review on remote data auditing in single cloud server: taxonomy and open issues. J. Netw. Comput. Appl. 43 (2014), 121–141.
-
(2014)
J. Netw. Comput. Appl.
, vol.43
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
51
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage in cloud computing
-
[51] Wang, C., Chow, S., Wang, Q., Ren, K., Lou, W, Privacy-preserving public auditing for secure cloud storage in cloud computing. IEEE Trans. Comput. PP (2012), 1–14.
-
(2012)
IEEE Trans. Comput.
, vol.PP
, pp. 1-14
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
52
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
[52] Wang, C., Ren, K., Lou, W., Li, J., Toward publicly auditable secure cloud data storage services. IEEE Network 24 (2010), 19–24.
-
(2010)
IEEE Network
, vol.24
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
53
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
[53] Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W., Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5 (2012), 220–232.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
54
-
-
84891798354
-
Proxy provable data possession in public clouds
-
1-1
-
[54] Wang, H., Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput., PP, 2012 1-1.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.PP
-
-
Wang, H.1
-
55
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
[55] Wang, Q.A., Wang, C., Ren, K., Lou, W.J., Li, J., Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distr. 22 (2011), 847–859.
-
(2011)
IEEE Trans. Parallel Distr.
, vol.22
, pp. 847-859
-
-
Wang, Q.A.1
Wang, C.2
Ren, K.3
Lou, W.J.4
Li, J.5
-
56
-
-
84898487969
-
A game-theoretic method of fair resource allocation for cloud computing services
-
[56] Wei, G., Vasilakos, A., Zheng, Y., Xiong, N., A game-theoretic method of fair resource allocation for cloud computing services. J. Supercomput. 54 (2010), 252–269.
-
(2010)
J. Supercomput.
, vol.54
, pp. 252-269
-
-
Wei, G.1
Vasilakos, A.2
Zheng, Y.3
Xiong, N.4
-
57
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
[57] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V., Security and privacy for storage and computation in cloud computing. Inf. Sci. 258 (2014), 371–386.
-
(2014)
Inf. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
58
-
-
79952020799
-
SecCloud: bridging secure storage and computation in cloud
-
IEEE Genova
-
[58] Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.V., SecCloud: bridging secure storage and computation in cloud. Thirtieth International Conference on Distributed Computing Systems Workshops (ICDCSW), 2010, IEEE, Genova, 52–61.
-
(2010)
Thirtieth International Conference on Distributed Computing Systems Workshops (ICDCSW)
, pp. 52-61
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Jia, W.4
Vasilakos, A.V.5
-
59
-
-
67650682832
-
Asymmetric group key agreement
-
A. Joux Springer Berlin Heidelberg
-
[59] Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J., Asymmetric group key agreement. Joux, A., (eds.) Advances in Cryptology - EUROCRYPT 2009, 2009, Springer, Berlin Heidelberg, 153–170.
-
(2009)
Advances in Cryptology - EUROCRYPT 2009
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Domingo-Ferrer, J.5
-
60
-
-
84907600349
-
DFL: secure and practical fault localization for datacenter networks
-
[60] Xin, Z., Fanfu, Z., Xinyu, Z., Haiyang, S., Perrig, A., Vasilakos, A.V., Guan, H., DFL: secure and practical fault localization for datacenter networks. IEEE/ACM Trans. Netw. 22 (2014), 1218–1231.
-
(2014)
IEEE/ACM Trans. Netw.
, vol.22
, pp. 1218-1231
-
-
Xin, Z.1
Fanfu, Z.2
Xinyu, Z.3
Haiyang, S.4
Perrig, A.5
Vasilakos, A.V.6
Guan, H.7
-
61
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
[61] Yang, K., Jia, X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. PP (2012), 1717–1726.
-
(2012)
IEEE Trans. Parallel Distrib.
, vol.PP
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
62
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
[62] Yang, K., Jia, X., An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. PP (2013), 1717–1726.
-
(2013)
IEEE Trans. Parallel Distrib.
, vol.PP
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
63
-
-
84858080984
-
A novel watermarking method for software protection in the cloud
-
[63] Yu, Z., Wang, C., Thomborson, C., Wang, J., Lian, S., Vasilakos, A.V., A novel watermarking method for software protection in the cloud. Softw. Pract. Exp. 42 (2012), 409–430.
-
(2012)
Softw. Pract. Exp.
, vol.42
, pp. 409-430
-
-
Yu, Z.1
Wang, C.2
Thomborson, C.3
Wang, J.4
Lian, S.5
Vasilakos, A.V.6
-
64
-
-
84934283890
-
Public integrity auditing for dynamic data sharing with multi-user modification
-
[64] Yuan, J., Yu, S., Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. PP (2015), 1717–1726.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.PP
, pp. 1717-1726
-
-
Yuan, J.1
Yu, S.2
-
65
-
-
35948963685
-
A novel ID-based designated verifier signature scheme
-
[65] Zhang, J., Mao, J., A novel ID-based designated verifier signature scheme. Inf. Sci. 178 (2008), 766–773.
-
(2008)
Inf. Sci.
, vol.178
, pp. 766-773
-
-
Zhang, J.1
Mao, J.2
-
66
-
-
84900355325
-
Efficient dynamic provable possession of remote data via update trees
-
[66] Y. Zhang, M. Blanton, Efficient dynamic provable possession of remote data via update trees, IACR Cryptology ePrint Archive, (2012) 291-291.
-
(2012)
IACR Cryptology ePrint Archive
, pp. 291-291
-
-
Zhang, Y.1
Blanton, M.2
-
67
-
-
84929268858
-
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
-
[67] Zhou, J., Cao, Z., Dong, X., Xiong, N., Vasilakos, A.V., 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314 (2015), 255–276.
-
(2015)
Inf. Sci.
, vol.314
, pp. 255-276
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Xiong, N.4
Vasilakos, A.V.5
|