-
1
-
-
84978224372
-
Ciphertext-policy attribute-based encryption with key-delegation abuse resistance
-
Springer
-
Jiang, Y., Susilo, W., Mu, Y., Guo, F., Ciphertext-policy attribute-based encryption with key-delegation abuse resistance. Australasian Conference on Information Security and Privacy, 2016, Springer, 477–494.
-
(2016)
Australasian Conference on Information Security and Privacy
, pp. 477-494
-
-
Jiang, Y.1
Susilo, W.2
Mu, Y.3
Guo, F.4
-
2
-
-
84912110181
-
Connected vehicles, the Internet of things, and fog computing
-
F. Bonomi, Connected vehicles, the Internet of things, and fog computing, in: The Eighth ACM International Workshop on Vehicular Inter-Networking, VANET, Las Vegas, USA, 2011, pp. 13–15.
-
(2011)
The Eighth ACM International Workshop on Vehicular Inter-Networking, VANET, Las Vegas, USA
, pp. 13-15
-
-
Bonomi, F.1
-
3
-
-
84907200176
-
Cloud storage forensics
-
Quick, D., Martini, B., Choo, R., Cloud storage forensics. Syngress, 2013.
-
(2013)
Syngress
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
4
-
-
85020845083
-
Cloud incident handling and forensic-by-design: cloud storage as a case study
-
Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.-K.R., Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput.: Pract. Exper., 2016.
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Ab Rahman, N.H.1
Cahyani, N.D.W.2
Choo, K.-K.R.3
-
6
-
-
85029659638
-
-
Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies.
-
C.J. DOrazio, K.-K.R. Choo, L.T. Yang, Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies.
-
-
-
DOrazio, C.J.1
Choo, K.-K.R.2
Yang, L.T.3
-
7
-
-
84995549442
-
Remote wiping and secure deletion on mobile devices: a review
-
Leom, M.D., Choo, K.-K.R., Hunt, R., Remote wiping and secure deletion on mobile devices: a review. J. Forensic Sci. 61:6 (2016), 1473–1492.
-
(2016)
J. Forensic Sci.
, vol.61
, Issue.6
, pp. 1473-1492
-
-
Leom, M.D.1
Choo, K.-K.R.2
Hunt, R.3
-
8
-
-
84942465510
-
A cloud-focused mobile forensics methodology
-
Do, Q., Martini, B., Choo, K.-K.R., A cloud-focused mobile forensics methodology. IEEE Cloud Comput. 2:4 (2015), 60–65.
-
(2015)
IEEE Cloud Comput.
, vol.2
, Issue.4
, pp. 60-65
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
9
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit. Investig. 11:4 (2014), 295–313.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
10
-
-
84922962817
-
Remote programmatic vCloud forensics: a six-step collection process and a proof of concept
-
IEEE
-
Martini, B., Choo, K.-K.R., Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014, IEEE, 935–942.
-
(2014)
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 935-942
-
-
Martini, B.1
Choo, K.-K.R.2
-
11
-
-
84889083567
-
Cloud storage forensics: ownCloud as a case study
-
Martini, B., Choo, K.-K.R., Cloud storage forensics: ownCloud as a case study. Digit. Investig. 10:4 (2013), 287–299.
-
(2013)
Digit. Investig.
, vol.10
, Issue.4
, pp. 287-299
-
-
Martini, B.1
Choo, K.-K.R.2
-
12
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
Martini, B., Choo, K.-K.R., An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 9:2 (2012), 71–80.
-
(2012)
Digit. Investig.
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
13
-
-
84916888408
-
Impacts of increasing volume of digital forensic data: A survey and future research challenges
-
Quick, D., Choo, K.-K.R., Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 11:4 (2014), 273–294.
-
(2014)
Digit. Investig.
, vol.11
, Issue.4
, pp. 273-294
-
-
Quick, D.1
Choo, K.-K.R.2
-
14
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
Quick, D., Choo, K.-K.R., Google drive: forensic analysis of data remnants. J. Netw. Comput. Appl. 40 (2014), 179–193.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
15
-
-
84877809583
-
Dropbox analysis: Data remnants on user machines
-
Quick, D., Choo, K.-K.R., Dropbox analysis: Data remnants on user machines. Digit. Investig. 10:1 (2013), 3–18.
-
(2013)
Digit. Investig.
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
16
-
-
84884589497
-
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
-
Quick, D., Choo, K.-K.R., Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?. Digit. Investig. 10:3 (2013), 266–277.
-
(2013)
Digit. Investig.
, vol.10
, Issue.3
, pp. 266-277
-
-
Quick, D.1
Choo, K.-K.R.2
-
17
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
Quick, D., Choo, K.-K., Raymond, Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener. Comput. Syst. 29:6 (2013), 1378–1394.
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.2
Raymond3
-
18
-
-
84912130127
-
The Fog computing paradigm: Scenarios and security issues
-
IEEE
-
Stojmenovic, I., Wen, S., The Fog computing paradigm: Scenarios and security issues. 2014 Federated Conference on Computer Science and Information Systems, (FedCSIS), 2014, IEEE, 1–8.
-
(2014)
2014 Federated Conference on Computer Science and Information Systems, (FedCSIS)
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
19
-
-
84991042624
-
Cloud cryptography: Theory, practice and future research directions
-
Choo, K.-K., Raymond, J., Domingo-Ferrer, Zhang, L., Cloud cryptography: Theory, practice and future research directions. Future Gener. Comput. Syst. 62 (2016), 51–53.
-
(2016)
Future Gener. Comput. Syst.
, vol.62
, pp. 51-53
-
-
Choo, K.-K.1
Raymond, J.2
Domingo-Ferrer3
Zhang, L.4
-
20
-
-
84910634929
-
Robust multi-factor authentication for fragile communications
-
Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11:6 (2014), 568–581.
-
(2014)
IEEE Trans. Dependable Secure Comput.
, vol.11
, Issue.6
, pp. 568-581
-
-
Huang, X.1
Xiang, Y.2
Bertino, E.3
Zhou, J.4
Xu, L.5
-
21
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
Springer
-
Yang, Y., Liu, J.K., Liang, K., Choo, K.-K.R., Zhou, J., Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. European Symposium on Research in Computer Security, 2015, Springer, 146–166.
-
(2015)
European Symposium on Research in Computer Security
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Choo, K.-K.R.4
Zhou, J.5
-
22
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
Yang, Y., Zhu, H., Lu, H., Weng, J., Zhang, Y., Choo, K.-K.R., Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
-
(2016)
Pervasive Mob. Comput.
, vol.28
, pp. 122-134
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Choo, K.-K.R.6
-
23
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
ACM New York, NY, USA
-
Cheung, L., Newport, C., Provably secure ciphertext policy ABE. Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, 2007, ACM, New York, NY, USA 978-1-59593-703-2, 456–465, 10.1145/1315245.1315302.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
24
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
S. Bellovin R. Gennaro A. Keromytis M. Yung Springer Berlin, Heidelberg
-
Nishide, T., Yoneyama, K., Ohta, K., Attribute-based encryption with partially hidden encryptor-specified access structures. Bellovin, S., Gennaro, R., Keromytis, A., Yung, M., (eds.) Applied Cryptography and Network Security Lecture Notes in Computer Science, vol. 5037, 2008, Springer Berlin, Heidelberg 978-3-540-68913-3, 111–129, 10.1007/978-3-540-68914-0_7.
-
(2008)
Applied Cryptography and Network Security, Lecture Notes in Computer Science
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
25
-
-
85029641603
-
-
Black Box Accountable Authority Identity-Based Encryption
-
V. Goyal, A. Sahai, S. Lu, B. Waters, Black Box Accountable Authority Identity-Based Encryption, 2008.
-
(2008)
-
-
Goyal, V.1
Sahai, A.2
Lu, S.3
Waters, B.4
-
26
-
-
84881122666
-
Opportunistic spatio-temporal event processing for mobile situation awareness
-
ACM
-
Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., Koldehofe, B., Opportunistic spatio-temporal event processing for mobile situation awareness. Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013, ACM, 195–206.
-
(2013)
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems
, pp. 195-206
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwälder, B.4
Koldehofe, B.5
-
27
-
-
84881119458
-
MigCEP: operator migration for mobility driven distributed complex event processing
-
ACM
-
Ottenwälder, B., Koldehofe, B., Rothermel, K., Ramachandran, U., MigCEP: operator migration for mobility driven distributed complex event processing. Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, 2013, ACM, 183–194.
-
(2013)
Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems
, pp. 183-194
-
-
Ottenwälder, B.1
Koldehofe, B.2
Rothermel, K.3
Ramachandran, U.4
-
28
-
-
84883732282
-
Mobile fog: A programming model for large-scale applications on the Internet of things
-
ACM
-
Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B., Koldehofe, B., Mobile fog: A programming model for large-scale applications on the Internet of things. Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, 2013, ACM, 15–20.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing
, pp. 15-20
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwälder, B.4
Koldehofe, B.5
-
29
-
-
84880905874
-
Improving web sites performance using edge servers in fog computing architecture
-
IEEE
-
Zhu, J., Chan, D.S., Prabhu, M.S., Natarajan, P., Hu, H., Bonomi, F., Improving web sites performance using edge servers in fog computing architecture. 2013 IEEE 7th International Symposium on Service Oriented System Engineering, (SOSE), 2013, IEEE, 320–323.
-
(2013)
2013 IEEE 7th International Symposium on Service Oriented System Engineering, (SOSE)
, pp. 320-323
-
-
Zhu, J.1
Chan, D.S.2
Prabhu, M.S.3
Natarajan, P.4
Hu, H.5
Bonomi, F.6
-
30
-
-
84889076773
-
Reliability in the utility computing era: Towards reliable fog computing
-
IEEE
-
Madsen, H., Albeanu, G., Burtschy, B., Popentiu-Vladicescu, F., Reliability in the utility computing era: Towards reliable fog computing. 2013 20th International Conference on Systems, Signals and Image Processing, (IWSSIP), 2013, IEEE, 43–46.
-
(2013)
2013 20th International Conference on Systems, Signals and Image Processing, (IWSSIP)
, pp. 43-46
-
-
Madsen, H.1
Albeanu, G.2
Burtschy, B.3
Popentiu-Vladicescu, F.4
-
31
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. Blakley D. Chaum Springer Berlin, Heidelberg
-
Shamir, A., Identity-based cryptosystems and signature schemes. Blakley, G., Chaum, D., (eds.) Advances in Cryptology Lecture Notes in Computer Science, vol. 196, 1985, Springer Berlin, Heidelberg 978-3-540-15658-1, 47–53, 10.1007/3-540-39568-7_5.
-
(1985)
Advances in Cryptology, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
32
-
-
24944554962
-
Fuzzy identity-based encryption
-
A. Sahai, B. Waters, Fuzzy identity-based encryption, in: EUROCRYPT, 2004, pp. 457–473.
-
(2004)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
33
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, A. Sahai, O. Pandey, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proc. of ACMCCS06 2006, pp. 89–98.
-
Proc. of ACMCCS06 2006
, pp. 89-98
-
-
Goyal, V.1
Sahai, A.2
Pandey, O.3
Waters, B.4
-
34
-
-
85029659604
-
-
Attribute-Based Encryption with Non-Monotonic Access Structures, 2007. Cryptology ePrint Archive, Report /323
-
R. Ostrovsky, A. Sahai, B. Waters, Attribute-Based Encryption with Non-Monotonic Access Structures, 2007. Cryptology ePrint Archive, Report 2007/323, http://eprint.iacr.org/.
-
(2007)
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
35
-
-
85029651790
-
-
Ciphertext-Policy Attribute-Based Encryption, Security and Privacy, 2007. SP’07. IEEE Symposium on
-
B.W. John Bethencourt, Amit Sahai, Ciphertext-Policy Attribute-Based Encryption, Security and Privacy, 2007. SP’07. IEEE Symposium on, 2007, pp. 321–334.
-
(2007)
, pp. 321-334
-
-
John Bethencourt, B.W.1
Sahai, A.2
-
36
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
M.M. Halldorsson A. INgolfsdottir I. Walukiewicz Springer Heidelberg
-
Goyal, V., Jain, A., Pandey, O., Sahai, A., Bounded ciphertext policy attribute based encryption. Halldorsson, M.M., INgolfsdottir, A., Walukiewicz, I., (eds.) ICALP 2008, Part II LNCS, vol. 5126, 2008, Springer, Heidelberg, 579–591.
-
(2008)
ICALP 2008, Part II, LNCS
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
37
-
-
79952523217
-
Constant size ciphertexts in threshold attribute-based encryption
-
Springer
-
Herranz, J., Laguillaumie, F., Ràfols, C., Constant size ciphertexts in threshold attribute-based encryption. Public Key Cryptography–PKC 2010, 2010, Springer, 19–34.
-
(2010)
Public Key Cryptography–PKC 2010
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ràfols, C.3
-
38
-
-
51849088550
-
Dynamic threshold public-key encryption
-
Springer
-
Delerablée, C., Pointcheval, D., Dynamic threshold public-key encryption. Advances in Cryptology–CRYPTO 2008, 2008, Springer, 317–334.
-
(2008)
Advances in Cryptology–CRYPTO 2008
, pp. 317-334
-
-
Delerablée, C.1
Pointcheval, D.2
-
39
-
-
84878513129
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Jonathan Katz, B.W., Sahai, Amit, Predicate encryption supporting disjunctions, polynomial equations, and inner products. J. Cryptol. 26:2 (2013), 191–224.
-
(2013)
J. Cryptol.
, vol.26
, Issue.2
, pp. 191-224
-
-
Jonathan Katz, B.W.1
Sahai, A.2
-
40
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
S. Vadhan Springer Berlin, Heidelberg
-
Boneh, D., Waters, B., Conjunctive, subset, and range queries on encrypted data. Vadhan, S., (eds.) Theory of Cryptography Lecture Notes in Computer Science, vol. 4392, 2007, Springer Berlin, Heidelberg 978-3-540-70935-0, 535–554, 10.1007/978-3-540-70936-7_29.
-
(2007)
Theory of Cryptography, Lecture Notes in Computer Science
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
41
-
-
77952383290
-
Attribute-based encryption with partially hidden ciphertext policies
-
Nishide, T., Yoneyama, K., OHTA, K., Attribute-based encryption with partially hidden ciphertext policies. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 09168508, 92(1), 2009, 22–32, 10.1587/transfun.E92.A.22.
-
(2009)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.92
, Issue.1
, pp. 22-32
-
-
Nishide, T.1
Yoneyama, K.2
OHTA, K.3
-
42
-
-
85029616080
-
-
Attribute-Based Encryption with Key Cloning Protection, Cryptology ePrint Archive, Report 2008/478
-
M.J. Hinek, S. Jiang, R. Safavi-Naini, S.F. Shahandashti, Attribute-Based Encryption with Key Cloning Protection, Cryptology ePrint Archive, Report 2008/478, 2008. http://eprint.iacr.org/.
-
(2008)
-
-
Hinek, M.J.1
Jiang, S.2
Safavi-Naini, R.3
Shahandashti, S.F.4
-
43
-
-
85029610566
-
-
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., IACR Cryptology ePrint Archive.
-
K.K. Jin Li, Kui Ren, A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control., IACR Cryptology ePrint Archive.
-
-
-
Jin Li, K.K.1
Ren, K.2
-
44
-
-
84988273293
-
Multi-authority ciphertext-policy attribute-based encryption with Accountability
-
ACM New York, NY, USA
-
Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D., Multi-authority ciphertext-policy attribute-based encryption with Accountability. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11, 2011, ACM, New York, NY, USA 978-1-4503-0564-8, 386–390, 10.1145/1966913.1966964.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS’11
, pp. 386-390
-
-
Li, J.1
Huang, Q.2
Chen, X.3
Chow, S.S.M.4
Wong, D.S.5
Xie, D.6
-
45
-
-
84872101907
-
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
-
Liu, Z., Cao, Z., Wong, D.S., White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. Nformaon Forn Ry Ranaon on 8:1 (2013), 76–88.
-
(2013)
Nformaon Forn Ry Ranaon on
, vol.8
, Issue.1
, pp. 76-88
-
-
Liu, Z.1
Cao, Z.2
Wong, D.S.3
-
46
-
-
84889056927
-
-
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay, IACR Cryptology ePrint Archive
-
Z. Liu, Z. Cao, D.S. Wong, Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay, IACR Cryptology ePrint Archive, 2013, pp. 475–486.
-
(2013)
, pp. 475-486
-
-
Liu, Z.1
Cao, Z.2
Wong, D.S.3
-
47
-
-
77954635558
-
Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption
-
H. Gilbert Springer Berlin, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B., Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption. Gilbert, H., (eds.) Advances in Cryptology EUROCRYPT 2010 Lecture Notes in Computer Science, vol. 6110, 2010, Springer Berlin, Heidelberg 978-3-642-13189-9, 62–91, 10.1007/978-3-642-13190-5_4.
-
(2010)
Advances in Cryptology EUROCRYPT 2010, Lecture Notes in Computer Science
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
48
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Springer
-
Boneh, D., Franklin, M., Identity-based encryption from the Weil pairing. Advances in CryptologyCRYPTO 2001, 2001, Springer, 213–229.
-
(2001)
Advances in CryptologyCRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
49
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer
-
Waters, B., Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. International Workshop on Public Key Cryptography, 2011, Springer, 53–70.
-
(2011)
International Workshop on Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
|