-
2
-
-
84924368818
-
Security in cloud computing: opportunities and challenges
-
[2] Ali, M., Khan, S.U., Vasilakos, A.V., Security in cloud computing: opportunities and challenges. Inf. Sci. 305 (2015), 357–383.
-
(2015)
Inf. Sci.
, vol.305
, pp. 357-383
-
-
Ali, M.1
Khan, S.U.2
Vasilakos, A.V.3
-
3
-
-
78650609369
-
Security guidance for critical areas of focus in cloud computing
-
[3] Archer, J., Boehm, A., Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance 2 (2009), 1–76.
-
(2009)
Cloud Security Alliance
, vol.2
, pp. 1-76
-
-
Archer, J.1
Boehm, A.2
-
4
-
-
42649140570
-
The restricted isometry property and its implications for compressed sensing
-
[4] Candès, E.J., The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique 346:9 (2008), 589–592.
-
(2008)
Comptes Rendus Mathematique
, vol.346
, Issue.9
, pp. 589-592
-
-
Candès, E.J.1
-
5
-
-
31744440684
-
Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
-
[5] Candès, E.J., Romberg, J., Tao, T., Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 52:2 (2006), 489–509.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.2
, pp. 489-509
-
-
Candès, E.J.1
Romberg, J.2
Tao, T.3
-
6
-
-
29144439194
-
Decoding by linear programming
-
[6] Candes, E.J., Tao, T., Decoding by linear programming. IEEE Trans. Inf. Theory 51:12 (2005), 4203–4215.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.12
, pp. 4203-4215
-
-
Candes, E.J.1
Tao, T.2
-
7
-
-
84878104490
-
Compressive sampling
-
Madrid, Spain
-
[7] Candès, E.J., et al. Compressive sampling. Proceedings of the international congress of mathematicians, vol. 3, 2006, Madrid, Spain, 1433–1452.
-
(2006)
Proceedings of the international congress of mathematicians
, vol.3
, pp. 1433-1452
-
-
Candès, E.J.1
-
8
-
-
84891322736
-
Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
-
[8] Chen, F., Xiang, T., Yang, Y., Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74:3 (2014), 2141–2151.
-
(2014)
J. Parallel Distrib. Comput.
, vol.74
, Issue.3
, pp. 2141-2151
-
-
Chen, F.1
Xiang, T.2
Yang, Y.3
-
9
-
-
77949735239
-
Signal processing with compressive measurements
-
[9] Davenport, M., Boufounos, P.T., Wakin, M.B., Baraniuk, R.G., et al. Signal processing with compressive measurements. IEEE J. Selected Top. Sig. Process. 4:2 (2010), 445–460.
-
(2010)
IEEE J. Selected Top. Sig. Process.
, vol.4
, Issue.2
, pp. 445-460
-
-
Davenport, M.1
Boufounos, P.T.2
Wakin, M.B.3
Baraniuk, R.G.4
-
10
-
-
77953814178
-
Compact storage of correlated data for content based retrieval
-
IEEE
-
[10] Divekar, A., Ersoy, O., Compact storage of correlated data for content based retrieval. Signals, Systems and Computers, 2009 Conference Record of the Forty-Third Asilomar Conference on, 2009, IEEE, 109–112.
-
(2009)
Signals, Systems and Computers, 2009 Conference Record of the Forty-Third Asilomar Conference on
, pp. 109-112
-
-
Divekar, A.1
Ersoy, O.2
-
11
-
-
33645712892
-
Compressed sensing
-
[11] Donoho, D.L., Compressed sensing. IEEE Trans. Inf. Theory 52:4 (2006), 1289–1306.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1289-1306
-
-
Donoho, D.L.1
-
12
-
-
84894900961
-
Dividing secrets to secure data outsourcing
-
[12] Emekci, F., Methwally, A., Agrawal, D., El Abbadi, A., Dividing secrets to secure data outsourcing. Inf. Sci. 263 (2014), 198–210.
-
(2014)
Inf. Sci.
, vol.263
, pp. 198-210
-
-
Emekci, F.1
Methwally, A.2
Agrawal, D.3
El Abbadi, A.4
-
13
-
-
84955409381
-
Introducing the counter mode of operation to compressed sensing based encryption
-
[13] Fay, R., Introducing the counter mode of operation to compressed sensing based encryption. Inf. Process. Lett. 116:4 (2016), 279–283.
-
(2016)
Inf. Process. Lett.
, vol.116
, Issue.4
, pp. 279-283
-
-
Fay, R.1
-
14
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
[14] Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8:06 (1998), 1259–1284.
-
(1998)
Int. J. Bifurcation Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
15
-
-
0004127488
-
Computers and Intractability
-
wh freeman
-
[15] Garey, M.R., Johnson, D.S., Computers and Intractability. vol. 29, 2002, wh freeman.
-
(2002)
, vol.29
-
-
Garey, M.R.1
Johnson, D.S.2
-
16
-
-
84902436467
-
Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud
-
[16] Lei, X., Liao, X., Huang, T., Heriniaina, F., Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280 (2014), 205–217.
-
(2014)
Inf. Sci.
, vol.280
, pp. 205-217
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Heriniaina, F.4
-
17
-
-
84919819478
-
Outsourcing large matrix inversion computation to a public cloud
-
1–1
-
[17] Lei, X., Liao, X., Huang, T., Li, H., Hu, C., Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput., 1(1), 2013 1–1.
-
(2013)
IEEE Trans. Cloud Comput.
, vol.1
, Issue.1
-
-
Lei, X.1
Liao, X.2
Huang, T.3
Li, H.4
Hu, C.5
-
18
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
[18] Liu, K., Kargupta, H., Ryan, J., Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18:1 (2006), 92–106.
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
19
-
-
84889103004
-
Architecture and protocol for intercloud communication
-
[19] Lloret, J., Garcia, M., Tomas, J., Rodrigues, J.J., Architecture and protocol for intercloud communication. Inf. Sci. 258 (2014), 434–451.
-
(2014)
Inf. Sci.
, vol.258
, pp. 434-451
-
-
Lloret, J.1
Garcia, M.2
Tomas, J.3
Rodrigues, J.J.4
-
21
-
-
62349119084
-
On the security and robustness of encryption via compressed sensing
-
IEEE
-
[21] Orsdemir, A., Altun, H.O., Sharma, G., Bocko, M.F., On the security and robustness of encryption via compressed sensing. Military Communications Conference, 2008. MILCOM 2008., 2008, IEEE, 1–7.
-
(2008)
Military Communications Conference, 2008. MILCOM 2008.
, pp. 1-7
-
-
Orsdemir, A.1
Altun, H.O.2
Sharma, G.3
Bocko, M.F.4
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
[22] Paillier, P., Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology EUROCRYPT 99, 1999, Springer, 223–238.
-
(1999)
Advances in Cryptology EUROCRYPT 99
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
64549094196
-
The secrecy of compressed sensing measurements
-
IEEE
-
[23] Rachlin, Y., Baron, D., The secrecy of compressed sensing measurements. 2008 46th Annual Allerton Conference on, Communication, Control, and Computing, 2008, IEEE, 813–817.
-
(2008)
2008 46th Annual Allerton Conference on, Communication, Control, and Computing
, pp. 813-817
-
-
Rachlin, Y.1
Baron, D.2
-
26
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
IEEE
-
[26] Wang, C., Ren, K., Wang, J., Secure and practical outsourcing of linear programming in cloud computing. 2011 Proceedings IEEE, INFOCOM, 2011, IEEE, 820–828.
-
(2011)
2011 Proceedings IEEE, INFOCOM
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
27
-
-
84961746418
-
Privacy-assured outsourcing of image reconstruction service in cloud
-
[27] Wang, C., Zhang, B., Ren, K., Roveda, J.M., Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Top. Comput. 1:1 (2013), 166–177.
-
(2013)
IEEE Trans. Emerg. Top. Comput.
, vol.1
, Issue.1
, pp. 166-177
-
-
Wang, C.1
Zhang, B.2
Ren, K.3
Roveda, J.M.4
-
28
-
-
84904427531
-
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing
-
IEEE
-
[28] Wang, C., Zhang, B., Ren, K., Roveda, J.M., Chen, C.W., Xu, Z., A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2014, IEEE, 2130–2138.
-
(2014)
IEEE INFOCOM 2014-IEEE Conference on Computer Communications
, pp. 2130-2138
-
-
Wang, C.1
Zhang, B.2
Ren, K.3
Roveda, J.M.4
Chen, C.W.5
Xu, Z.6
-
29
-
-
84937458648
-
Compressive sensing based secure multiparty privacy preserving framework for collaborative data-mining and signal processing
-
IEEE
-
[29] Wang, Q., Zeng, W., Tian, J., Compressive sensing based secure multiparty privacy preserving framework for collaborative data-mining and signal processing. 2014 IEEE International Conference on Multimedia and Expo (ICME), 2014, IEEE, 1–6.
-
(2014)
2014 IEEE International Conference on Multimedia and Expo (ICME)
, pp. 1-6
-
-
Wang, Q.1
Zeng, W.2
Tian, J.3
-
30
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
[30] Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V., Security and privacy for storage and computation in cloud computing. Inf. Sci. 258 (2014), 371–386.
-
(2014)
Inf. Sci.
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
31
-
-
0001476552
-
A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images
-
[31] Zeng, W., Liu, B., A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Trans. Image Process. 8:11 (1999), 1534–1548.
-
(1999)
IEEE Trans. Image Process.
, vol.8
, Issue.11
, pp. 1534-1548
-
-
Zeng, W.1
Liu, B.2
-
32
-
-
84906655458
-
Efficient computation outsourcing for inverting a class of homomorphic functions
-
[32] Zhang, F., Ma, X., Liu, S., Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286 (2014), 19–28.
-
(2014)
Inf. Sci.
, vol.286
, pp. 19-28
-
-
Zhang, F.1
Ma, X.2
Liu, S.3
-
33
-
-
84983379207
-
Bi-level protected compressive sampling
-
[33] Zhang, L.Y., Wong, K.-W., Zhang, Y., Zhou, Z., Bi-level protected compressive sampling. IEEE Trans. Multimedia 18:9 (2016), 1720–1732.
-
(2016)
IEEE Trans. Multimedia
, vol.18
, Issue.9
, pp. 1720-1732
-
-
Zhang, L.Y.1
Wong, K.-W.2
Zhang, Y.3
Zhou, Z.4
-
34
-
-
84979799708
-
A review of compressive sensing in information security field
-
1–1.
-
[34] Zhang, Y., Zhang, L.Y., Zhou, J., Liu, L., Chen, F., He, X., A review of compressive sensing in information security field. IEEE Access, PP(99), 2016 1–1.
-
(2016)
IEEE Access
, vol.PP
, Issue.99
-
-
Zhang, Y.1
Zhang, L.Y.2
Zhou, J.3
Liu, L.4
Chen, F.5
He, X.6
|