-
1
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al. A view of cloud computing. Commun. ACM 53:4 (2010), 50–58.
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
2
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
IEEE
-
Foster, I., Zhao, Y., Raicu, I., Lu, S., Cloud computing and grid computing 360-degree compared. Grid Computing Environments Workshop, 2008, GCE’08, 2008, IEEE, 1–10.
-
(2008)
Grid Computing Environments Workshop, 2008, GCE’08
, pp. 1-10
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
3
-
-
78649302229
-
Cloud computing: state-of-the-art and research challenges
-
Zhang, Q., Cheng, L., Boutaba, R., Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1:1 (2010), 7–18.
-
(2010)
J. Internet Serv. Appl.
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
4
-
-
84991042624
-
Cloud cryptography: Theory, practice and future research directions
-
Choo, K.-K.R., Domingo-Ferrer, J., Zhang, L., Cloud cryptography: Theory, practice and future research directions. Future Gener. Comput. Syst. 62 (2016), 51–53.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 51-53
-
-
Choo, K.-K.R.1
Domingo-Ferrer, J.2
Zhang, L.3
-
5
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K.-K.R., Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
-
(2016)
Pervasive Mob. Comput.
, vol.28
, pp. 122-134
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Choo, K.-K.R.6
-
6
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
Springer
-
Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. European Symposium on Research in Computer Security, 2015, Springer, 146–166.
-
(2015)
European Symposium on Research in Computer Security
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.-K.R.4
Zhou, J.5
-
7
-
-
84967214668
-
A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management
-
IEEE
-
Tep, K.S., Martini, B., Hunt, R., Choo, K.-K.R., A taxonomy of cloud attack consequences and mitigation strategies: The role of access control and privileged access management. Trustcom/BigDataSE/ISPA, 2015 IEEE, Vol. 1, 2015, IEEE, 1073–1080.
-
(2015)
Trustcom/BigDataSE/ISPA, 2015 IEEE, Vol. 1
, pp. 1073-1080
-
-
Tep, K.S.1
Martini, B.2
Hunt, R.3
Choo, K.-K.R.4
-
8
-
-
85029608498
-
Segoac: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing
-
Ren, W., Liu, R., Lei, M., Choo, K.-K.R., Segoac: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces, 2016.
-
(2016)
Comput. Stand. Interfaces
-
-
Ren, W.1
Liu, R.2
Lei, M.3
Choo, K.-K.R.4
-
9
-
-
80955160447
-
That ‘internet of things’ thing
-
Ashton, K., That ‘internet of things’ thing. RFiD J. 22:7 (2009), 97–114.
-
(2009)
RFiD J.
, vol.22
, Issue.7
, pp. 97-114
-
-
Ashton, K.1
-
10
-
-
77956877124
-
The Internet of things: A survey
-
Atzori, L., Iera, A., Morabito, G., The Internet of things: A survey. Comput. Netw. 54:15 (2010), 2787–2805.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
11
-
-
84912110181
-
Connected vehicles, the Internet of things, and fog computing
-
F. Bonomi, Connected vehicles, the Internet of things, and fog computing, in: The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET), Las Vegas, USA, 2011, pp. 13–15.
-
(2011)
The Eighth ACM International Workshop on Vehicular Inter-Networking (VANET), Las Vegas, USA
, pp. 13-15
-
-
Bonomi, F.1
-
12
-
-
84866627419
-
Fog computing and its role in the Internet of things
-
ACM
-
Bonomi, F., Milito, R., Zhu, J., Addepalli, S., Fog computing and its role in the Internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, 2012, ACM, 13–16.
-
(2012)
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
13
-
-
73649137161
-
The path of the smart grid
-
Farhangi, H., The path of the smart grid. IEEE Power Energy Mag. 8:1 (2010), 18–28.
-
(2010)
IEEE Power Energy Mag.
, vol.8
, Issue.1
, pp. 18-28
-
-
Farhangi, H.1
-
14
-
-
27744595750
-
Toward a smart grid: power delivery for the 21st century
-
Amin, S.M., Wollenberg, B.F., Toward a smart grid: power delivery for the 21st century. IEEE Power Energy Mag. 3:5 (2005), 34–41.
-
(2005)
IEEE Power Energy Mag.
, vol.3
, Issue.5
, pp. 34-41
-
-
Amin, S.M.1
Wollenberg, B.F.2
-
15
-
-
84955563270
-
Health fog: a novel framework for health and wellness applications
-
Ahmad, M., Amin, M.B., Hussain, S., Kang, B.H., Cheong, T., Lee, S., Health fog: a novel framework for health and wellness applications. J. Supercomput., 2016, 1–19.
-
(2016)
J. Supercomput.
, pp. 1-19
-
-
Ahmad, M.1
Amin, M.B.2
Hussain, S.3
Kang, B.H.4
Cheong, T.5
Lee, S.6
-
16
-
-
84939148004
-
Smart e-health gateway: Bringing intelligence to Internet-of-things based ubiquitous healthcare systems
-
IEEE
-
Rahmani, A.-M., Thanigaivelan, N.K., Gia, T.N., Granados, J., Negash, B., Liljeberg, P., Tenhunen, H., Smart e-health gateway: Bringing intelligence to Internet-of-things based ubiquitous healthcare systems. Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE, 2015, IEEE, 826–834.
-
(2015)
Consumer Communications and Networking Conference (CCNC), 2015 12th Annual IEEE
, pp. 826-834
-
-
Rahmani, A.-M.1
Thanigaivelan, N.K.2
Gia, T.N.3
Granados, J.4
Negash, B.5
Liljeberg, P.6
Tenhunen, H.7
-
17
-
-
84950986038
-
Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing
-
ACM
-
Cao, Y., Hou, P., Brown, D., Wang, J., Chen, S., Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing. Proceedings of the 2015 Workshop on Mobile Big Data, 2015, ACM, 43–48.
-
(2015)
Proceedings of the 2015 Workshop on Mobile Big Data
, pp. 43-48
-
-
Cao, Y.1
Hou, P.2
Brown, D.3
Wang, J.4
Chen, S.5
-
18
-
-
74049112206
-
Cloud security issues
-
IEEE
-
Kandukuri, B.R., Rakshit, A., et al. Cloud security issues. IEEE International Conference on Services Computing, 2009, SCC’09, 2009, IEEE, 517–520.
-
(2009)
IEEE International Conference on Services Computing, 2009, SCC’09
, pp. 517-520
-
-
Kandukuri, B.R.1
Rakshit, A.2
-
19
-
-
78349299500
-
The management of security in cloud computing
-
IEEE
-
Ramgovind, S., Eloff, M.M., Smith, E., The management of security in cloud computing. 2010 Information Security for South Africa, 2010, IEEE, 1–7.
-
(2010)
2010 Information Security for South Africa
, pp. 1-7
-
-
Ramgovind, S.1
Eloff, M.M.2
Smith, E.3
-
20
-
-
84861072527
-
Data security and privacy protection issues in cloud computing
-
IEEE
-
Chen, D., Zhao, H., Data security and privacy protection issues in cloud computing. 2012 International Conference on Computer Science and Electronics Engineering, Vol. 1, (ICCSEE), 2012, IEEE, 647–651.
-
(2012)
2012 International Conference on Computer Science and Electronics Engineering, Vol. 1, (ICCSEE)
, pp. 647-651
-
-
Chen, D.1
Zhao, H.2
-
21
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
Rong, C., Nguyen, S.T., Jaatun, M.G., Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39:1 (2013), 47–54.
-
(2013)
Comput. Electr. Eng.
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
22
-
-
84951994695
-
Cloud Security: Issues and Concerns
-
Wiley New York
-
Samarati, P., di Vimercati, S.D.C., Cloud Security: Issues and Concerns. 2016, Wiley, New York.
-
(2016)
-
-
Samarati, P.1
di Vimercati, S.D.C.2
-
23
-
-
84910149653
-
Security of the Internet of things: Perspectives and challenges
-
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D., Security of the Internet of things: Perspectives and challenges. Wirel. Netw. 20:8 (2014), 2481–2501.
-
(2014)
Wirel. Netw.
, vol.20
, Issue.8
, pp. 2481-2501
-
-
Jing, Q.1
Vasilakos, A.V.2
Wan, J.3
Lu, J.4
Qiu, D.5
-
24
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of things
-
Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed Internet of things. Comput. Netw. 57:10 (2013), 2266–2279.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
25
-
-
84906834039
-
Internet of things in industries: A survey
-
Da Xu, L., He, W., Li, S., Internet of things in industries: A survey. IEEE Trans. Ind. Inf. 10:4 (2014), 2233–2243.
-
(2014)
IEEE Trans. Ind. Inf.
, vol.10
, Issue.4
, pp. 2233-2243
-
-
Da Xu, L.1
He, W.2
Li, S.3
-
26
-
-
84975528034
-
Security in Internet of things: Challenges, solutions and future directions
-
IEEE
-
Kumar, S.A., Vealey, T., Srivastava, H., Security in Internet of things: Challenges, solutions and future directions. 2016 49th Hawaii International Conference on System Sciences, (HICSS), 2016, IEEE, 5772–5781.
-
(2016)
2016 49th Hawaii International Conference on System Sciences, (HICSS)
, pp. 5772-5781
-
-
Kumar, S.A.1
Vealey, T.2
Srivastava, H.3
-
27
-
-
84902429611
-
Cloud Storage Forensics
-
Syngress
-
Quick, D., Martini, B., Choo, R., Cloud Storage Forensics. 2013, Syngress.
-
(2013)
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
28
-
-
85020845083
-
Cloud incident handling and forensic-by-design: cloud storage as a case study
-
Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.-K.R., Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput.: Pract. Exper., 2016.
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Ab Rahman, N.H.1
Cahyani, N.D.W.2
Choo, K.-K.R.3
-
29
-
-
84991570412
-
Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study
-
Cahyani, N.D.W., Martini, B., Choo, K.-K.R., Al-Azhar, A., Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurr. Comput.: Pract. Exper., 2016.
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Cahyani, N.D.W.1
Martini, B.2
Choo, K.-K.R.3
Al-Azhar, A.4
-
30
-
-
84995549442
-
Remote wiping and secure deletion on mobile devices: a review
-
Leom, M.D., Choo, K.-K.R., Hunt, R., Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci., 2016.
-
(2016)
J. Forensic Sci.
-
-
Leom, M.D.1
Choo, K.-K.R.2
Hunt, R.3
-
31
-
-
84942465510
-
A cloud-focused mobile forensics methodology
-
Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.4
, pp. 60-65
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
32
-
-
84920152770
-
Distributed filesystem forensics: Xtreemfs as a case study
-
Martini, B., Choo, K.-K.R., Distributed filesystem forensics: Xtreemfs as a case study. Digit. Investig. 11:4 (2014), 295–313.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
33
-
-
84922962817
-
Remote programmatic vcloud forensics: a six-step collection process and a proof of concept
-
IEEE
-
Martini, B., Choo, K.-K.R., Remote programmatic vcloud forensics: a six-step collection process and a proof of concept. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, IEEE, 935–942.
-
(2014)
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 935-942
-
-
Martini, B.1
Choo, K.-K.R.2
-
34
-
-
85029637110
-
-
Data exfiltration from Internet of things devices: ios devices as case studies.
-
C.J. DOrazio, K.-K.R. Choo, L.T. Yang, Data exfiltration from Internet of things devices: ios devices as case studies.
-
-
-
DOrazio, C.J.1
Choo, K.-K.R.2
Yang, L.T.3
-
35
-
-
84889083567
-
Cloud storage forensics: owncloud as a case study
-
Martini, B., Choo, K.-K.R., Cloud storage forensics: owncloud as a case study. Digit. Investig. 10:4 (2013), 287–299.
-
(2013)
Digit. Investig.
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
36
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
37
-
-
84916888408
-
Impacts of increasing volume of digital forensic data: A survey and future research challenges
-
Quick, D., Choo, K.-K.R., Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 11:4 (2014), 273–294.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 273-294
-
-
Quick, D.1
Choo, K.-K.R.2
-
38
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
Quick, D., Choo, K.-K.R., Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
39
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
40
-
-
84884589497
-
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
-
Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
41
-
-
84875147433
-
Digital droplets: Microsoft skydrive forensic data remnants
-
Quick, D., Choo, K.-K.R., Digital droplets: Microsoft skydrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
42
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
Springer
-
Yi, S., Qin, Z., Li, Q., Security and privacy issues of fog computing: A survey. Wireless Algorithms, Systems, and Applications, 2015, Springer, 685–695.
-
(2015)
Wireless Algorithms, Systems, and Applications
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
43
-
-
84964284114
-
Fog computing in healthcare Internet of things: A case study on ecg feature extraction
-
IEEE
-
Gia, T.N., Jiang, M., Rahmani, A.-M., Westerlund, T., Liljeberg, P., Tenhunen, H., Fog computing in healthcare Internet of things: A case study on ecg feature extraction. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (CIT/IUCC/DASC/PICOM), 2015, IEEE, 356–363.
-
(2015)
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (CIT/IUCC/DASC/PICOM)
, pp. 356-363
-
-
Gia, T.N.1
Jiang, M.2
Rahmani, A.-M.3
Westerlund, T.4
Liljeberg, P.5
Tenhunen, H.6
-
44
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24:1 (2013), 131–143.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
45
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
IEEE
-
Yu, S., Wang, C., Ren, K., Lou, W., Achieving secure, scalable, and fine-grained data access control in cloud computing. Infocom, 2010 proceedings IEEE, 2010, IEEE, 1–9.
-
(2010)
Infocom, 2010 proceedings IEEE
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
46
-
-
84906492508
-
Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks
-
Springer
-
Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K., Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks. European Symposium on Research in Computer Security, 2014, Springer, 130–147.
-
(2014)
European Symposium on Research in Computer Security
, pp. 130-147
-
-
Yuen, T.H.1
Zhang, Y.2
Yiu, S.M.3
Liu, J.K.4
-
47
-
-
84939245573
-
times attribute-based anonymous access control for cloud computing
-
Yuen, T.H., Liu, J.K., Au, M.H., Huang, X., Susilo, W., Zhou, J., -times attribute-based anonymous access control for cloud computing. IEEE Trans. Comput. 64:9 (2015), 2595–2608.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.9
, pp. 2595-2608
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Huang, X.4
Susilo, W.5
Zhou, J.6
-
48
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Springer
-
Kocher, P.C., Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. Annual International Cryptology Conference, 1996, Springer, 104–113.
-
(1996)
Annual International Cryptology Conference
, pp. 104-113
-
-
Kocher, P.C.1
-
49
-
-
84939573910
-
Differential power analysis
-
Springer
-
Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Annual International Cryptology Conference, 1999, Springer, 388–397.
-
(1999)
Annual International Cryptology Conference
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
50
-
-
66149173689
-
Lest we remember: cold-boot attacks on encryption keys
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W., Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52:5 (2009), 91–98.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
51
-
-
78751478860
-
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
-
IEEE
-
Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V., Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage. 2010 51st Annual IEEE Symposium on Foundations of Computer Science, (FOCS), 2010, IEEE, 501–510.
-
(2010)
2010 51st Annual IEEE Symposium on Foundations of Computer Science, (FOCS)
, pp. 501-510
-
-
Brakerski, Z.1
Kalai, Y.T.2
Katz, J.3
Vaikuntanathan, V.4
-
52
-
-
78751485079
-
Cryptography against continuous memory attacks
-
IEEE
-
Dodis, Y., Haralambiev, K., López-Alt, A., Wichs, D., Cryptography against continuous memory attacks. 2010 51st Annual IEEE Symposium on Foundations of Computer Science, (FOCS), 2010, IEEE, 511–520.
-
(2010)
2010 51st Annual IEEE Symposium on Foundations of Computer Science, (FOCS)
, pp. 511-520
-
-
Dodis, Y.1
Haralambiev, K.2
López-Alt, A.3
Wichs, D.4
-
53
-
-
79953188689
-
Signatures resilient to continual leakage on memory and computation
-
Springer
-
Malkin, T., Teranishi, I., Vahlis, Y., Yung, M., Signatures resilient to continual leakage on memory and computation. Theory of Cryptography, 2011, Springer, 89–106.
-
(2011)
Theory of Cryptography
, pp. 89-106
-
-
Malkin, T.1
Teranishi, I.2
Vahlis, Y.3
Yung, M.4
-
54
-
-
84863311631
-
Storing secrets on continually leaky devices
-
IEEE
-
Dodis, Y., Lewko, A., Waters, B., Wichs, D., Storing secrets on continually leaky devices. 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, (FOCS), 2011, IEEE, 688–697.
-
(2011)
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, (FOCS)
, pp. 688-697
-
-
Dodis, Y.1
Lewko, A.2
Waters, B.3
Wichs, D.4
-
55
-
-
84951268418
-
Updatable hash proof system and its applications
-
Springer
-
Yang, R., Xu, Q., Zhou, Y., Zhang, R., Hu, C., Yu, Z., Updatable hash proof system and its applications. Computer Security–ESORICS 2015, 2015, Springer, 266–285.
-
(2015)
Computer Security–ESORICS 2015
, pp. 266-285
-
-
Yang, R.1
Xu, Q.2
Zhou, Y.3
Zhang, R.4
Hu, C.5
Yu, Z.6
-
56
-
-
84859970436
-
Identity-based encryption resilient to continual auxiliary leakage
-
Springer
-
Yuen, T.H., Chow, S.S., Zhang, Y., Yiu, S.M., Identity-based encryption resilient to continual auxiliary leakage. Advances in Cryptology–EUROCRYPT 2012, 2012, Springer, 117–134.
-
(2012)
Advances in Cryptology–EUROCRYPT 2012
, pp. 117-134
-
-
Yuen, T.H.1
Chow, S.S.2
Zhang, Y.3
Yiu, S.M.4
-
57
-
-
79953164949
-
Achieving leakage resilience through dual system encryption
-
Springer
-
Lewko, A., Rouselakis, Y., Waters, B., Achieving leakage resilience through dual system encryption. Theory of Cryptography, 2011, Springer, 70–88.
-
(2011)
Theory of Cryptography
, pp. 70-88
-
-
Lewko, A.1
Rouselakis, Y.2
Waters, B.3
-
58
-
-
84862596866
-
Multiparty computation secure against continual memory leakage
-
ACM
-
Boyle, E., Goldwasser, S., Jain, A., Kalai, Y.T., Multiparty computation secure against continual memory leakage. Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing, 2012, ACM, 1235–1254.
-
(2012)
Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing
, pp. 1235-1254
-
-
Boyle, E.1
Goldwasser, S.2
Jain, A.3
Kalai, Y.T.4
-
59
-
-
84901650094
-
Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
-
Springer
-
Attrapadung, N., Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. Advances in Cryptology–EUROCRYPT 2014, 2014, Springer, 557–577.
-
(2014)
Advances in Cryptology–EUROCRYPT 2014
, pp. 557-577
-
-
Attrapadung, N.1
-
60
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
Springer
-
Shamir, A., Identity-based cryptosystems and signature schemes. Advances in Cryptology, 1984, Springer, 47–53.
-
(1984)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
61
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Springer
-
Boneh, D., Franklin, M., Identity-based encryption from the weil pairing. Annual International Cryptology Conference, 2001, Springer, 213–229.
-
(2001)
Annual International Cryptology Conference
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
62
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
Springer
-
Boneh, D., Boyen, X., Efficient selective-id secure identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT 2004, 2004, Springer, 223–238.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
63
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Springer
-
Boneh, D., Boyen, X., Secure identity based encryption without random oracles. Advances in Cryptology–Crypto 2004, 2004, Springer, 443–459.
-
(2004)
Advances in Cryptology–Crypto 2004
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
64
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Springer
-
Boneh, D., Boyen, X., Goh, E.-J., Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology–EUROCRYPT 2005, 2005, Springer, 440–456.
-
(2005)
Advances in Cryptology–EUROCRYPT 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
65
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
ACM
-
Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, ACM, 89–98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
66
-
-
24944554962
-
Fuzzy identity-based encryption
-
Springer
-
Sahai, A., Waters, B., Fuzzy identity-based encryption. Advances in Cryptology–EUROCRYPT 2005, 2005, Springer, 457–473.
-
(2005)
Advances in Cryptology–EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
67
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Springer
-
Waters, B., Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. Advances in Cryptology-CRYPTO 2009, 2009, Springer, 619–636.
-
(2009)
Advances in Cryptology-CRYPTO 2009
, pp. 619-636
-
-
Waters, B.1
-
68
-
-
77949581448
-
New techniques for dual system encryption and fully secure hibe with short ciphertexts
-
Springer
-
Lewko, A., Waters, B., New techniques for dual system encryption and fully secure hibe with short ciphertexts. Theory of Cryptography, 2010, Springer, 455–479.
-
(2010)
Theory of Cryptography
, pp. 455-479
-
-
Lewko, A.1
Waters, B.2
-
69
-
-
79958006339
-
Unbounded hibe and attribute-based encryption
-
Springer
-
Lewko, A., Waters, B., Unbounded hibe and attribute-based encryption. Advances in Cryptology–EUROCRYPT 2011, 2011, Springer, 547–567.
-
(2011)
Advances in Cryptology–EUROCRYPT 2011
, pp. 547-567
-
-
Lewko, A.1
Waters, B.2
-
70
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Springer
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B., Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. Advances in Cryptology–EUROCRYPT 2010, 2010, Springer, 62–91.
-
(2010)
Advances in Cryptology–EUROCRYPT 2010
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
71
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Springer
-
Okamoto, T., Takashima, K., Fully secure functional encryption with general relations from the decisional linear assumption. Advances in Cryptology–CRYPTO 2010, 2010, Springer, 191–208.
-
(2010)
Advances in Cryptology–CRYPTO 2010
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
72
-
-
79952511284
-
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
-
Springer
-
Attrapadung, N., Libert, B., Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation. Public Key Cryptography–PKC 2010, 2010, Springer, 384–402.
-
(2010)
Public Key Cryptography–PKC 2010
, pp. 384-402
-
-
Attrapadung, N.1
Libert, B.2
-
73
-
-
84860009960
-
Adaptively attribute-hiding (hierarchical) inner product encryption
-
Springer
-
Okamoto, T., Takashima, K., Adaptively attribute-hiding (hierarchical) inner product encryption. Advances in Cryptology–EUROCRYPT 2012, 2012, Springer, 591–608.
-
(2012)
Advances in Cryptology–EUROCRYPT 2012
, pp. 591-608
-
-
Okamoto, T.1
Takashima, K.2
-
74
-
-
84859952520
-
Tools for simulating features of composite order bilinear groups in the prime order setting
-
Springer
-
Lewko, A., Tools for simulating features of composite order bilinear groups in the prime order setting. Advances in Cryptology–EUROCRYPT 2012, 2012, Springer, 318–335.
-
(2012)
Advances in Cryptology–EUROCRYPT 2012
, pp. 318-335
-
-
Lewko, A.1
-
75
-
-
84958548032
-
Dual system encryption via predicate encodings
-
Springer
-
Wee, H., Dual system encryption via predicate encodings. Theory of Cryptography, 2014, Springer, 616–637.
-
(2014)
Theory of Cryptography
, pp. 616-637
-
-
Wee, H.1
-
76
-
-
85029649342
-
-
Dual system encryption framework in prime-order groups. IACR Cryptology ePrint Archive, 2015:390
-
N. Attrapadung, Dual system encryption framework in prime-order groups. IACR Cryptology ePrint Archive, 2015:390, 2015.
-
(2015)
-
-
Attrapadung, N.1
-
77
-
-
84942606727
-
Improved dual system abe in prime-order groups via predicate encodings
-
Springer
-
Chen, J., Gay, R., Wee, H., Improved dual system abe in prime-order groups via predicate encodings. Advances in Cryptology-EUROCRYPT 2015, 2015, Springer, 595–624.
-
(2015)
Advances in Cryptology-EUROCRYPT 2015
, pp. 595-624
-
-
Chen, J.1
Gay, R.2
Wee, H.3
-
78
-
-
84978191687
-
Leakage-resilient functional encryption via pair encodings
-
Springer
-
Yu, Z., Au, M.H., Xu, Q., Yang, R., Han, J., Leakage-resilient functional encryption via pair encodings. Australasian Conference on Information Security and Privacy, 2016, Springer, 443–460.
-
(2016)
Australasian Conference on Information Security and Privacy
, pp. 443-460
-
-
Yu, Z.1
Au, M.H.2
Xu, Q.3
Yang, R.4
Han, J.5
-
79
-
-
24144433396
-
Evaluating 2-dnf formulas on ciphertexts
-
Springer
-
Boneh, D., Goh, E.-J., Nissim, K., Evaluating 2-dnf formulas on ciphertexts. Theory of Cryptography, 2005, Springer, 325–341.
-
(2005)
Theory of Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
80
-
-
84865452842
-
Functional encryption for regular languages
-
Springer
-
Waters, B., Functional encryption for regular languages. Advances in Cryptology–CRYPTO 2012, 2012, Springer, 218–235.
-
(2012)
Advances in Cryptology–CRYPTO 2012
, pp. 218-235
-
-
Waters, B.1
-
81
-
-
84889034631
-
Practical constructions and new proof methods for large universe attribute-based encryption
-
ACM
-
Rouselakis, Y., Waters, B., Practical constructions and new proof methods for large universe attribute-based encryption. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, ACM, 463–474.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 463-474
-
-
Rouselakis, Y.1
Waters, B.2
-
82
-
-
79952510987
-
Expressive key-policy attribute-based encryption with constant-size ciphertexts
-
Springer
-
Attrapadung, N., Libert, B., De Panafieu, E., Expressive key-policy attribute-based encryption with constant-size ciphertexts. Public Key Cryptography–PKC 2011, 2011, Springer, 90–108.
-
(2011)
Public Key Cryptography–PKC 2011
, pp. 90-108
-
-
Attrapadung, N.1
Libert, B.2
De Panafieu, E.3
-
83
-
-
84865462674
-
Spatial Encryption
-
(Ph.D. thesis) Stanford University
-
Hamburg, M., Spatial Encryption. (Ph.D. thesis), 2011, Stanford University.
-
(2011)
-
-
Hamburg, M.1
|