-
1
-
-
84905244958
-
Metadata driven efficient key generation and distribution in cloud security
-
Anitha R, Mukherjee S. Metadata driven efficient key generation and distribution in cloud security. Journal of Computer Science 2014; 10: 1929–1938.
-
(2014)
Journal of Computer Science
, vol.10
, pp. 1929-1938
-
-
Anitha, R.1
Mukherjee, S.2
-
2
-
-
85043268105
-
Certificateless public auditing scheme for cloud-assisted wireless body area networks
-
He D, Zeadally S, Wu L. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal 2015. DOI: 10.1109/JSYST.2015.2428620.
-
(2015)
IEEE Systems Journal
-
-
He, D.1
Zeadally, S.2
Wu, L.3
-
3
-
-
84880127634
-
Data integrity proof and secure computation in cloud computing
-
Ponnuramu V, Tamilselvan L. Data integrity proof and secure computation in cloud computing. Journal of Computer Science 2012; 8: 1987–1995.
-
(2012)
Journal of Computer Science
, vol.8
, pp. 1987-1995
-
-
Ponnuramu, V.1
Tamilselvan, L.2
-
4
-
-
84928106743
-
Mutual verifiable provable data auditing in public cloud storage
-
Ren Y, Shen J, Wang J, Han J, Lee S. Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology 2015; 16(2): 317–323.
-
(2015)
Journal of Internet Technology
, vol.16
, Issue.2
, pp. 317-323
-
-
Ren, Y.1
Shen, J.2
Wang, J.3
Han, J.4
Lee, S.5
-
5
-
-
80051514746
-
Achieving fine-grained access control for secure data sharing on cloud servers
-
Wang G, Liu Q, Wu J. Achieving fine-grained access control for secure data sharing on cloud servers. Concurrency and Computation: Practice and Experience 2011; 23(12): 1443–1464.
-
(2011)
Concurrency and Computation: Practice and Experience
, vol.23
, Issue.12
, pp. 1443-1464
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
6
-
-
84935442590
-
Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud
-
Wang J, Yu X, Zhao M. Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud. International Journal of Network Security 2015; 17(4): 471–483.
-
(2015)
International Journal of Network Security
, vol.17
, Issue.4
, pp. 471-483
-
-
Wang, J.1
Yu, X.2
Zhao, M.3
-
8
-
-
84927789109
-
A two-factor authentication scheme with anonymity for multi-server environments
-
Chen CT, Lee CC. A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks 2015; 8(8): 1608–1625.
-
(2015)
Security and Communication Networks
, vol.8
, Issue.8
, pp. 1608-1625
-
-
Chen, C.T.1
Lee, C.C.2
-
10
-
-
84922001116
-
Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks
-
He D, Kumar N, Chen J, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 2015; 21(1): 49–60.
-
(2015)
Multimedia Systems
, vol.21
, Issue.1
, pp. 49-60
-
-
He, D.1
Kumar, N.2
Chen, J.3
-
11
-
-
84935865949
-
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
-
He D, Kumar N, Chilamkurti N. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 2015; 321: 263–277.
-
(2015)
Information Sciences
, vol.321
, pp. 263-277
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
12
-
-
84921481484
-
Authentication protocol for ambient assisted living system
-
He D, Zeadally S. Authentication protocol for ambient assisted living system. IEEE Communications Magazine 2015; 35(1): 71–77.
-
(2015)
IEEE Communications Magazine
, vol.35
, Issue.1
, pp. 71-77
-
-
He, D.1
Zeadally, S.2
-
13
-
-
84874109689
-
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
-
Koo DY, Hur JB, Yoon HS. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering 2013; 39(1): 34–46.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.1
, pp. 34-46
-
-
Koo, D.Y.1
Hur, J.B.2
Yoon, H.S.3
-
14
-
-
84881510395
-
A survey on attribute-based encryption schemes of access control in cloud environments
-
Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security 2013; 15(4): 231–240.
-
(2013)
International Journal of Network Security
, vol.15
, Issue.4
, pp. 231-240
-
-
Lee, C.C.1
Chung, P.S.2
Hwang, M.S.3
-
15
-
-
84870234713
-
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
-
Lee CC, Lin TH, Tsai CS. Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications. Securit and Communication Networks 2012; 5(12): 1375–1378.
-
(2012)
Securit and Communication Networks
, vol.5
, Issue.12
, pp. 1375-1378
-
-
Lee, C.C.1
Lin, T.H.2
Tsai, C.S.3
-
16
-
-
84928721359
-
A Dynamic Identity Based User Authentication Scheme for Remote Login Systems
-
Li CT, Lee CC, Weng CY. A Dynamic Identity Based User Authentication Scheme for Remote Login Systems. Security and Communication Networks, 2015. DOI:10.1002/sec.1264.
-
(2015)
Security and Communication Networks
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
17
-
-
84867432845
-
Secure cloud storage based on cryptographic techniques
-
Peng Y, Zhao W, Xie F, Dai ZH, Gao Y, Chen DQ. Secure cloud storage based on cryptographic techniques. The Journal of China Universities of Posts and Telecommunications 2012; 19(2): 182–189.
-
(2012)
The Journal of China Universities of Posts and Telecommunications
, vol.19
, Issue.2
, pp. 182-189
-
-
Peng, Y.1
Zhao, W.2
Xie, F.3
Dai, Z.H.4
Gao, Y.5
Chen, D.Q.6
-
18
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
Wang QJ, Liu Q, Wu J, Guo MY. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security 2011; 30(5): 320–331.
-
(2011)
Computers & Security
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, Q.J.1
Liu, Q.2
Wu, J.3
Guo, M.Y.4
-
19
-
-
24944554962
-
Fuzzy identity-based encryption
-
Sahai A, Waters B. Fuzzy identity-based encryption. LNCS 2005; 3494: 457–473.
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
21
-
-
84891807562
-
Key-aggregate cryptosystem for scalable data sharing in cloud storage
-
Chu CK, Chow SM, Tzeng WG, Zhou J, Deng RH. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems 2014; 25(2): 468–477.
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 468-477
-
-
Chu, C.K.1
Chow, S.M.2
Tzeng, W.G.3
Zhou, J.4
Deng, R.H.5
-
25
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Tzeng WG. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2002; 14(1): 182–188.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
26
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
Yi X, Ye Y. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2003; 15(4): 1054–1055.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
27
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
Chien HY. Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2004; 16(10): 1301–1304.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chien, H.Y.1
-
28
-
-
33947655924
-
Security of Chien's efficient time-bound hierarchical key assignment scheme
-
Yi X. Security of Chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2005; 17(9): 1298–1299.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.9
, pp. 1298-1299
-
-
Yi, X.1
-
32
-
-
84866608660
-
An efficient time-bound hierarchical key management scheme without tamper-resistant devices
-
Chen CM, Wu TY, He BZ, Sun HM. An efficient time-bound hierarchical key management scheme without tamper-resistant devices. Proc. of the IEEE International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), 2012; 285–288.
-
(2012)
Proc. of the IEEE International Conference on Computing, Measurement, Control and Sensor Network (CMCSN)
, pp. 285-288
-
-
Chen, C.M.1
Wu, T.Y.2
He, B.Z.3
Sun, H.M.4
-
33
-
-
77953310709
-
Achieving secure, scalablefine-grained data access control in cloud computing
-
Yu S, Wang C, Ren K, Lou W. Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. of the IEEE INFOCOM, 2010; 1–9.
-
(2010)
Proc. of the IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
36
-
-
84858038683
-
Secure and privacy preserving keyword searching for cloud storage services
-
Liu Q, Wang G, Wu J. Secure and privacy preserving keyword searching for cloud storage services. Journal of Network and Computer Applications 2012; 35(3): 927–933.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 927-933
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
37
-
-
84893774081
-
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
-
Fan CI, Huang SY. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Generation Computer Systems 2013; 29(7): 1716–1724.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1716-1724
-
-
Fan, C.I.1
Huang, S.Y.2
-
38
-
-
84885662348
-
Data dynamics for remote data possession checking in cloud storage
-
Chen L, Zhou S, Huang X, Xu L. Data dynamics for remote data possession checking in cloud storage. Computers and Electrical Engineering 2013; 29(7):2413–2424.
-
(2013)
Computers and Electrical Engineering
, vol.29
, Issue.7
, pp. 2413-2424
-
-
Chen, L.1
Zhou, S.2
Huang, X.3
Xu, L.4
-
39
-
-
84877786210
-
Mona: secure multi-owner data sharing for dynamic groups in the cloud
-
Liu XF, Zhang YQ, Wang BY, Yan JB. Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems 2013; 24(6): 1182–1191.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.F.1
Zhang, Y.Q.2
Wang, B.Y.3
Yan, J.B.4
-
40
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Wang C, Chow SM, Wang Q, Ren K, Lou WJ. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers 2013; 62(2): 362–375.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.M.2
Wang, Q.3
Ren, K.4
Lou, W.J.5
-
41
-
-
84888349708
-
Privacy-preserving public auditing for secure cloud storage
-
Li JW, Li J, Chen XF, Liu ZL, Jia CF. Privacy-preserving public auditing for secure cloud storage. Future Generation Computer Systems 2014; 30(11): 98–106.
-
(2014)
Future Generation Computer Systems
, vol.30
, Issue.11
, pp. 98-106
-
-
Li, J.W.1
Li, J.2
Chen, X.F.3
Liu, Z.L.4
Jia, C.F.5
-
42
-
-
84889079354
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
Liu Q, Wang GJ, Wu J. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Information Sciences 2014; 258(24): 355–370.
-
(2014)
Information Sciences
, vol.258
, Issue.24
, pp. 355-370
-
-
Liu, Q.1
Wang, G.J.2
Wu, J.3
-
44
-
-
23944461491
-
A one round protocol for tripartite Diffie–Hellman
-
Joux A. A one round protocol for tripartite Diffie–Hellman. Journal of Cryptology 2004; 17(4): 263–276.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
45
-
-
21144454271
-
Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups
-
Joux A, Nguyen K. Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups. Journal of Cryptology 2003; 16(4): 239–247.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.4
, pp. 239-247
-
-
Joux, A.1
Nguyen, K.2
-
46
-
-
84944270475
-
A dynamic threshold decryption scheme using bilinear pairings
-
King B. A dynamic threshold decryption scheme using bilinear pairings. International Journal of Network Security 2015; 17(6): 771–778.
-
(2015)
International Journal of Network Security
, vol.17
, Issue.6
, pp. 771-778
-
-
King, B.1
-
47
-
-
80054087969
-
Group oriented identity-based deniable authentication protocol from the bilinear pairings
-
Lu R, Cao Z. Group oriented identity-based deniable authentication protocol from the bilinear pairings. International Journal of Network Security 2007; 5(3): 283–287.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 283-287
-
-
Lu, R.1
Cao, Z.2
-
48
-
-
80054058425
-
ID-based weak blind signature from bilinear pairings
-
Zhao ZM. ID-based weak blind signature from bilinear pairings. International Journal of Network Security 2008; 7(2): 265–268.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 265-268
-
-
Zhao, Z.M.1
-
49
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. Lecture Notes in Computer Science 2005; 3621: 258–275.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
51
-
-
84925535323
-
A new three-party authenticated key agreement scheme based on chaotic maps without password table
-
Lee CC, Li CT, Chiu ST, Lai YM. A new three-party authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dynamics 2015; 79(4): 2485–2495.
-
(2015)
Nonlinear Dynamics
, vol.79
, Issue.4
, pp. 2485-2495
-
-
Lee, C.C.1
Li, C.T.2
Chiu, S.T.3
Lai, Y.M.4
-
52
-
-
84899085643
-
An extended chaotic-maps-based protocol with key agreement for multi-server environments
-
Lee CC, Lou DC, Li CT, Hsu CW. An extended chaotic-maps-based protocol with key agreement for multi-server environments. Nonlinear Dynamics 2014; 76(1): 853–866.
-
(2014)
Nonlinear Dynamics
, vol.76
, Issue.1
, pp. 853-866
-
-
Lee, C.C.1
Lou, D.C.2
Li, C.T.3
Hsu, C.W.4
-
53
-
-
84892610583
-
Application of BAN-logic., CMG Public Sector B.V
-
19 April
-
Wessels J. Application of BAN-logic. Technical Report, CMG Public Sector B.V., 19 April 2001.
-
(2001)
Technical Report
-
-
Wessels, J.1
|