메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 51-53

Cloud Cryptography: Theory, Practice and Future Research Directions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84991042624     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2016.04.017     Document Type: Editorial
Times cited : (35)

References (28)
  • 4
    • 84962604436 scopus 로고    scopus 로고
    • Highly privacy-protecting data sharing in a tree structure
    • [4] Canard, Sébastien, Devigne, Julien, Highly privacy-protecting data sharing in a tree structure. Future Gener. Comput. Syst. 62 (2016), 119–127.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 119-127
    • Canard, S.1    Devigne, J.2
  • 5
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: challenges and future research directions
    • [5] Choo, Kim-Kwang Raymond, The cyber threat landscape: challenges and future research directions. Computers & Security 30:8 (2011), 719–731.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 6
    • 84942421658 scopus 로고    scopus 로고
    • Balancing privacy with legitimate surveillance and lawful data access
    • [6] Choo, Kim-Kwang Raymond, Sarre, Rick, Balancing privacy with legitimate surveillance and lawful data access. IEEE Cloud Computing 2:4 (2015), 8–13.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.4 , pp. 8-13
    • Choo, K.-K.R.1    Sarre, R.2
  • 7
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: improved definitions and efficient constructions
    • in: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM CCS 2006.
    • [7] Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM CCS 2006, 2006, pp. 79–88.
    • (2006) , pp. 79-88
    • Curtmola, R.1    Garay, J.2    Kamara, S.3    Ostrovsky, R.4
  • 8
    • 84991105518 scopus 로고    scopus 로고
    • Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs. Plenary Sitting,.
    • [8] European Parliament, Report on the US NSA Surveillance Programme, Surveillance Bodies in Various Member States and Their Impact on EU Citizens’ Fundamental Rights and on Transatlantic Cooperation in Justice and Home Affairs. Plenary Sitting, 2014. http://www.europarl.europa.eu/document/activities/cont/201403/20140306ATT80632/20140306ATT80632EN.pdf.
    • (2014)
  • 9
    • 84950146701 scopus 로고    scopus 로고
    • Memory leakage-resilient searchable symmetric encryption
    • [9] Dai, Shuguang, Li, Huige, Zhang, Fangguo, Memory leakage-resilient searchable symmetric encryption. Future Gener. Comput. Syst. 62 (2016), 76–84.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 76-84
    • Dai, S.1    Li, H.2    Zhang, F.3
  • 10
    • 36849069363 scopus 로고    scopus 로고
    • The internet, technology, and organized crime
    • [10] Grabosky, Peter, The internet, technology, and organized crime. Asian J. Criminol., 2(2), 2007, 145e61.
    • (2007) Asian J. Criminol. , vol.2 , Issue.2 , pp. 145e61
    • Grabosky, P.1
  • 11
    • 84958580839 scopus 로고    scopus 로고
    • Secure searches in the cloud: a survey
    • [11] Han, Fei, Qin, Jing, Hu, Jiankun, Secure searches in the cloud: a survey. Future Gener. Comput. Syst. 62 (2016), 66–75.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 66-75
    • Han, F.1    Qin, J.2    Hu, J.3
  • 12
    • 84964228113 scopus 로고    scopus 로고
    • Probability-based reversible image authentication scheme for image demosaicking
    • [12] Hu, Yu-Chen, Lo, Chun-Chi, Chen, Wu-Lin, Probability-based reversible image authentication scheme for image demosaicking. Future Gener. Comput. Syst. 62 (2016), 92–103.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 92-103
    • Hu, Y.-C.1    Lo, C.-C.2    Chen, W.-L.3
  • 14
    • 84995549442 scopus 로고    scopus 로고
    • Remote wiping and secure deletion on mobile devices: a review
    • (in press)
    • [14] Leom, Ming Di, Choo, Kim-Kwang Raymond, Hunt, Ray, Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci., 2016 (in press).
    • (2016) J. Forensic Sci.
    • Leom, M.D.1    Choo, K.-K.R.2    Hunt, R.3
  • 15
    • 84949009058 scopus 로고    scopus 로고
    • Efficient and privacy-preserving skyline computation framework across domains
    • [15] Liu, Ximeng, Lu, Rongxing, Ma, Jianfeng, Chen, Le, Bao, Haiyong, Efficient and privacy-preserving skyline computation framework across domains. Future Gener. Comput. Syst. 62 (2016), 161–174.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 161-174
    • Liu, X.1    Lu, R.2    Ma, J.3    Chen, L.4    Bao, H.5
  • 16
    • 84949639722 scopus 로고    scopus 로고
    • A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
    • [16] Lu, Yang, Li, Jiguo, A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62 (2016), 140–147.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 140-147
    • Lu, Y.1    Li, J.2
  • 17
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
    • [17] Osanaiye, Opeyemi, Choo, Kim-Kwang Raymond, Dlodlo, Mqhele, Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl., 2016, 10.1016/j.jnca.2016.01.001.
    • (2016) J. Netw. Comput. Appl.
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodlo, M.3
  • 18
    • 84954226661 scopus 로고    scopus 로고
    • Fine-grained data sharing in cloud computing for mobile devices
    • in: Proceedings of 2015 IEEE Conference on Computer Communications, INFOCOM 2015.
    • [18] Jun Shao, Rongxing Lu, Xiaodong Lin, Fine-grained data sharing in cloud computing for mobile devices, in: Proceedings of 2015 IEEE Conference on Computer Communications, INFOCOM 2015, 2015, pp. 2677–2685.
    • (2015) , pp. 2677-2685
    • Shao, J.1    Lu, R.2    Lin, X.3
  • 19
    • 84888840097 scopus 로고    scopus 로고
    • Simultaneous authentication and secrecy in identity-based data upload to cloud
    • [19] Qin, Bo, Wang, Huaqun, Wu, Qianhong, Liu, Jianwei, Domingo-Ferrer, Josep, Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Comput. 16:4 (2013), 845–859.
    • (2013) Cluster Comput. , vol.16 , Issue.4 , pp. 845-859
    • Qin, B.1    Wang, H.2    Wu, Q.3    Liu, J.4    Domingo-Ferrer, J.5
  • 21
    • 84894562939 scopus 로고    scopus 로고
    • Identity-based remote data possession checking in public clouds
    • [21] Wang, Huaqun, Wu, Qianhong, Qin, Bo, Domingo-Ferrer, Josep, Identity-based remote data possession checking in public clouds. IET Information Security 8:2 (2014), 114–121.
    • (2014) IET Information Security , vol.8 , Issue.2 , pp. 114-121
    • Wang, H.1    Wu, Q.2    Qin, B.3    Domingo-Ferrer, J.4
  • 22
    • 84952359558 scopus 로고    scopus 로고
    • Batch public key cryptosystem with batch multi-exponentiation
    • [22] Wu, Qianhong, Sun, Yang, Qin, Bo, Hu, Jiankun, Liu, Weiran, Liu, Jianwei, Ding, Yong, Batch public key cryptosystem with batch multi-exponentiation. Future Gener. Comput. Syst. 62 (2016), 196–204.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 196-204
    • Wu, Q.1    Sun, Y.2    Qin, B.3    Hu, J.4    Liu, W.5    Liu, J.6    Ding, Y.7
  • 23
    • 84949255807 scopus 로고    scopus 로고
    • Two schemes of privacy-preserving trust evaluation
    • [23] Yan, Zheng, Ding, Wenxiu, Niemi, Valtteri, Vasilakos, Athanasios V., Two schemes of privacy-preserving trust evaluation. Future Gener. Comput. Syst. 62 (2016), 175–189.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 175-189
    • Yan, Z.1    Ding, W.2    Niemi, V.3    Vasilakos, A.V.4
  • 24
    • 84953271237 scopus 로고    scopus 로고
    • Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
    • [24] Yang, Xu, Huang, Xinyi, Liu, Joseph K., Efficient handover authentication with user anonymity and untraceability for mobile cloud computing. Future Gener. Comput. Syst. 62 (2016), 190–195.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 190-195
    • Yang, X.1    Huang, X.2    Liu, J.K.3
  • 27
  • 28
    • 84948808956 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption version 2: making mobile access easy in cloud
    • [28] Zhou, Yunya, Deng, Hua, Wu, Qianhong, Qin, Bo, Liu, Jianwei, Ding, Yong, Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62 (2016), 128–139.
    • (2016) Future Gener. Comput. Syst. , vol.62 , pp. 128-139
    • Zhou, Y.1    Deng, H.2    Wu, Q.3    Qin, B.4    Liu, J.5    Ding, Y.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.