-
1
-
-
36048954205
-
Towards a theory of data entanglement
-
[1] Aspnes, James, Feigenbaum, Joan, Yampolskiy, Aleksandr, Zhong, Sheng, Towards a theory of data entanglement. Theoret. Comput. Sci. 389:1–2 (2007), 26–43.
-
(2007)
Theoret. Comput. Sci.
, vol.389
, Issue.1-2
, pp. 26-43
-
-
Aspnes, J.1
Feigenbaum, J.2
Yampolskiy, A.3
Zhong, S.4
-
2
-
-
84957684104
-
Entangled cloud storage
-
[2] Ateniese, Giuseppe, Dagdelen, Ozgur, Damgård, Ivan, Venturi, Daniele, Entangled cloud storage. Future Gener. Comput. Syst. 62 (2016), 104–118.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 104-118
-
-
Ateniese, G.1
Dagdelen, O.2
Damgård, I.3
Venturi, D.4
-
3
-
-
84966415357
-
Privacy-preserving distribution of statistical computation to a semi-honest multi-cloud
-
IEEE
-
[3] Calviño, Aida, Ricci, Sara, Domingo-Ferrer, Josep, Privacy-preserving distribution of statistical computation to a semi-honest multi-cloud. 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, Sep. 28–30, 2015, IEEE, 506–514.
-
(2015)
2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, Sep. 28–30
, pp. 506-514
-
-
Calviño, A.1
Ricci, S.2
Domingo-Ferrer, J.3
-
4
-
-
84962604436
-
Highly privacy-protecting data sharing in a tree structure
-
[4] Canard, Sébastien, Devigne, Julien, Highly privacy-protecting data sharing in a tree structure. Future Gener. Comput. Syst. 62 (2016), 119–127.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 119-127
-
-
Canard, S.1
Devigne, J.2
-
5
-
-
80955142795
-
The cyber threat landscape: challenges and future research directions
-
[5] Choo, Kim-Kwang Raymond, The cyber threat landscape: challenges and future research directions. Computers & Security 30:8 (2011), 719–731.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
6
-
-
84942421658
-
Balancing privacy with legitimate surveillance and lawful data access
-
[6] Choo, Kim-Kwang Raymond, Sarre, Rick, Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Computing 2:4 (2015), 8–13.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.4
, pp. 8-13
-
-
Choo, K.-K.R.1
Sarre, R.2
-
7
-
-
34547240272
-
Searchable symmetric encryption: improved definitions and efficient constructions
-
in: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM CCS 2006.
-
[7] Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM CCS 2006, 2006, pp. 79–88.
-
(2006)
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
8
-
-
84991105518
-
-
Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs. Plenary Sitting,.
-
[8] European Parliament, Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs. Plenary Sitting, 2014. http://www.europarl.europa.eu/document/activities/cont/201403/20140306ATT80632/20140306ATT80632EN.pdf.
-
(2014)
-
-
-
9
-
-
84950146701
-
Memory leakage-resilient searchable symmetric encryption
-
[9] Dai, Shuguang, Li, Huige, Zhang, Fangguo, Memory leakage-resilient searchable symmetric encryption. Future Gener. Comput. Syst. 62 (2016), 76–84.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 76-84
-
-
Dai, S.1
Li, H.2
Zhang, F.3
-
10
-
-
36849069363
-
The internet, technology, and organized crime
-
[10] Grabosky, Peter, The internet, technology, and organized crime. Asian J. Criminol., 2(2), 2007, 145e61.
-
(2007)
Asian J. Criminol.
, vol.2
, Issue.2
, pp. 145e61
-
-
Grabosky, P.1
-
11
-
-
84958580839
-
Secure searches in the cloud: a survey
-
[11] Han, Fei, Qin, Jing, Hu, Jiankun, Secure searches in the cloud: a survey. Future Gener. Comput. Syst. 62 (2016), 66–75.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 66-75
-
-
Han, F.1
Qin, J.2
Hu, J.3
-
12
-
-
84964228113
-
Probability-based reversible image authentication scheme for image demosaicking
-
[12] Hu, Yu-Chen, Lo, Chun-Chi, Chen, Wu-Lin, Probability-based reversible image authentication scheme for image demosaicking. Future Gener. Comput. Syst. 62 (2016), 92–103.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 92-103
-
-
Hu, Y.-C.1
Lo, C.-C.2
Chen, W.-L.3
-
13
-
-
84952342355
-
Enabled/disabled predicate encryption in clouds
-
[13] Huang, Shi-Yuan, Fan, Chun-I, Tseng, Yi-Fan, Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 62 (2016), 148–160.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 148-160
-
-
Huang, S.-Y.1
Fan, C.-I.2
Tseng, Y.-F.3
-
14
-
-
84995549442
-
Remote wiping and secure deletion on mobile devices: a review
-
(in press)
-
[14] Leom, Ming Di, Choo, Kim-Kwang Raymond, Hunt, Ray, Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci., 2016 (in press).
-
(2016)
J. Forensic Sci.
-
-
Leom, M.D.1
Choo, K.-K.R.2
Hunt, R.3
-
15
-
-
84949009058
-
Efficient and privacy-preserving skyline computation framework across domains
-
[15] Liu, Ximeng, Lu, Rongxing, Ma, Jianfeng, Chen, Le, Bao, Haiyong, Efficient and privacy-preserving skyline computation framework across domains. Future Gener. Comput. Syst. 62 (2016), 161–174.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 161-174
-
-
Liu, X.1
Lu, R.2
Ma, J.3
Chen, L.4
Bao, H.5
-
16
-
-
84949639722
-
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
-
[16] Lu, Yang, Li, Jiguo, A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62 (2016), 140–147.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 140-147
-
-
Lu, Y.1
Li, J.2
-
17
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
-
[17] Osanaiye, Opeyemi, Choo, Kim-Kwang Raymond, Dlodlo, Mqhele, Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl., 2016, 10.1016/j.jnca.2016.01.001.
-
(2016)
J. Netw. Comput. Appl.
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodlo, M.3
-
18
-
-
84954226661
-
Fine-grained data sharing in cloud computing for mobile devices
-
in: Proceedings of 2015 IEEE Conference on Computer Communications, INFOCOM 2015.
-
[18] Jun Shao, Rongxing Lu, Xiaodong Lin, Fine-grained data sharing in cloud computing for mobile devices, in: Proceedings of 2015 IEEE Conference on Computer Communications, INFOCOM 2015, 2015, pp. 2677–2685.
-
(2015)
, pp. 2677-2685
-
-
Shao, J.1
Lu, R.2
Lin, X.3
-
19
-
-
84888840097
-
Simultaneous authentication and secrecy in identity-based data upload to cloud
-
[19] Qin, Bo, Wang, Huaqun, Wu, Qianhong, Liu, Jianwei, Domingo-Ferrer, Josep, Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Comput. 16:4 (2013), 845–859.
-
(2013)
Cluster Comput.
, vol.16
, Issue.4
, pp. 845-859
-
-
Qin, B.1
Wang, H.2
Wu, Q.3
Liu, J.4
Domingo-Ferrer, J.5
-
20
-
-
84950159689
-
Garbled computation in cloud
-
[20] Wang, Yongge, Malluhi, Qutaibah M., Khan, Khaled MD, Garbled computation in cloud. Future Gener. Comput. Syst. 62 (2016), 54–65.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 54-65
-
-
Wang, Y.1
Malluhi, Q.M.2
Khan, K.M.3
-
21
-
-
84894562939
-
Identity-based remote data possession checking in public clouds
-
[21] Wang, Huaqun, Wu, Qianhong, Qin, Bo, Domingo-Ferrer, Josep, Identity-based remote data possession checking in public clouds. IET Information Security 8:2 (2014), 114–121.
-
(2014)
IET Information Security
, vol.8
, Issue.2
, pp. 114-121
-
-
Wang, H.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
22
-
-
84952359558
-
Batch public key cryptosystem with batch multi-exponentiation
-
[22] Wu, Qianhong, Sun, Yang, Qin, Bo, Hu, Jiankun, Liu, Weiran, Liu, Jianwei, Ding, Yong, Batch public key cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62 (2016), 196–204.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 196-204
-
-
Wu, Q.1
Sun, Y.2
Qin, B.3
Hu, J.4
Liu, W.5
Liu, J.6
Ding, Y.7
-
23
-
-
84949255807
-
Two schemes of privacy-preserving trust evaluation
-
[23] Yan, Zheng, Ding, Wenxiu, Niemi, Valtteri, Vasilakos, Athanasios V., Two schemes of privacy-preserving trust evaluation. Future Gener. Comput. Syst. 62 (2016), 175–189.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 175-189
-
-
Yan, Z.1
Ding, W.2
Niemi, V.3
Vasilakos, A.V.4
-
24
-
-
84953271237
-
Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
-
[24] Yang, Xu, Huang, Xinyi, Liu, Joseph K., Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gener. Comput. Syst. 62 (2016), 190–195.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 190-195
-
-
Yang, X.1
Huang, X.2
Liu, J.K.3
-
25
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
Springer-Verlag 21–25 September
-
[25] Yang, Yanjiang, Liu, Joseph K., Liang, Kaitai, Choo, Kim-Kwang Raymond, Zhou, Jianying, Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. Proceedings of 20th European Symposium on Research in Computer Security, ESORICS 2015, Vienna, Austria Lecture Notes in Computer Science, vol. 9327/2015, 2015, Springer-Verlag, 146–166 21–25 September.
-
(2015)
Proceedings of 20th European Symposium on Research in Computer Security, ESORICS 2015, Vienna, Austria, Lecture Notes in Computer Science
, vol.vol. 9327/2015
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.-K.R.4
Zhou, J.5
-
26
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
[26] Yang, Yanjiang, Zhu, Haiyan, Lu, Haibing, Weng, Jian, Zhang, Youcheng, Choo, Kim-Kwang Raymond, Cloud based data sharing with fine-grained proxy re-encryption. Pervasive and Mobile Computing, 2016, 10.1016/j.pmcj.2015.06.017.
-
(2016)
Pervasive and Mobile Computing
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Choo, K.-K.R.6
-
27
-
-
84961276029
-
Cloud data integrity checking with an identity-based auditing mechanism from RSA
-
[27] Yu, Yong, Xue, Liang, Au, Man Ho, Susilo, Willy, Ni, Jianbing, Zhang, Yafang, Vasilakos, Athanasios V., Shen, Jian, Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62 (2016), 85–91.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 85-91
-
-
Yu, Y.1
Xue, L.2
Au, M.H.3
Susilo, W.4
Ni, J.5
Zhang, Y.6
Vasilakos, A.V.7
Shen, J.8
-
28
-
-
84948808956
-
Identity-based proxy re-encryption version 2: making mobile access easy in cloud
-
[28] Zhou, Yunya, Deng, Hua, Wu, Qianhong, Qin, Bo, Liu, Jianwei, Ding, Yong, Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62 (2016), 128–139.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 128-139
-
-
Zhou, Y.1
Deng, H.2
Wu, Q.3
Qin, B.4
Liu, J.5
Ding, Y.6
|