-
1
-
-
77954051808
-
-
Recommendations Nat. Inst. Standards Technol., NIST, Washington, DC, USA, Tech. Rep. 800-145
-
P. Mell and T. Grance, "The NIST definition of cloud computing, " Recommendations Nat. Inst. Standards Technol., NIST, Washington, DC, USA, Tech. Rep. 800-145, 2011.
-
(2011)
The NIST Definition of Cloud Computing
-
-
Mell, P.1
Grance, T.2
-
2
-
-
84905024335
-
Toward efficient and privacy-preserving computing in big data era
-
Jul./Aug.
-
R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, "Toward efficient and privacy-preserving computing in big data era, " IEEE Netw., vol. 28, no. 4, pp. 46-50, Jul./Aug. 2014.
-
(2014)
IEEE Netw.
, vol.28
, Issue.4
, pp. 46-50
-
-
Lu, R.1
Zhu, H.2
Liu, X.3
Liu, J.K.4
Shao, J.5
-
3
-
-
84903121888
-
Expressive, efficient, and revocable data access control for multi-Authority cloud storage
-
Jul.
-
K. Yang and X. Jia, "Expressive, efficient, and revocable data access control for multi-Authority cloud storage, " IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 7, pp. 1735-1744, Jul. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
4
-
-
84928685729
-
Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid
-
H. Li, D. Liu, K. Alharbi, S. Zhang, and X. Lin, "Enabling fine-grained access control with efficient attribute revocation and policy updating in smart grid, " KSII Trans. Internet Inf. Syst., vol. 9, no. 4, pp. 1404-1423, 2015.
-
(2015)
KSII Trans. Internet Inf. Syst.
, vol.9
, Issue.4
, pp. 1404-1423
-
-
Li, H.1
Liu, D.2
Alharbi, K.3
Zhang, S.4
Lin, X.5
-
5
-
-
84968761568
-
Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach
-
May
-
K. Yang, Z. Liu, X. Jia, and X. S. Shen, "Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach, " IEEE Trans. Multimedia, vol. 18, no. 5, pp. 940-950, May 2016.
-
(2016)
IEEE Trans. Multimedia
, vol.18
, Issue.5
, pp. 940-950
-
-
Yang, K.1
Liu, Z.2
Jia, X.3
Shen, X.S.4
-
6
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Proc. PKC, Taormina, Italy, 2011, pp. 53-70.
-
(2011)
Proc. PKC, Taormina, Italy
, pp. 53-70
-
-
Waters, B.1
-
7
-
-
58749115565
-
Secure threshold multi authority attribute based encryption without a central authority
-
H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure threshold multi authority attribute based encryption without a central authority, " in Proc. INDOCRYPT, Kharagpur, India, 2008, pp. 426-436.
-
(2008)
Proc. INDOCRYPT, Kharagpur, India
, pp. 426-436
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
8
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
Heidelberg, Germany: Springer
-
T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures, " in Applied Cryptography and Network Security. Heidelberg, Germany: Springer, 2008, pp. 111-129.
-
(2008)
Applied Cryptography and Network Security
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
9
-
-
70350407157
-
Privacy-Aware attribute-based encryption with user accountability
-
J. Li, K. Ren, B. Zhu, and Z. Wan, "Privacy-Aware attribute-based encryption with user accountability, " in Proc. Inf. Security, Pisa, Italy, 2009, pp. 347-362.
-
(2009)
Proc. Inf. Security, Pisa, Italy
, pp. 347-362
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
10
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
Heidelberg, Germany: Springer
-
D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data, " in Theory of Cryptography. Heidelberg, Germany: Springer, 2007, pp. 535-554.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
11
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Heidelberg, Germany: Springer
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products, " in Advances in Cryptology-EUROCRYPT 2008. Heidelberg, Germany: Springer, 2008, pp. 146-162.
-
(2008)
Advances in Cryptology-EUROCRYPT 2008
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
12
-
-
79956295416
-
Fully secure cipertext-policy hiding CPABE
-
Heidelberg, Germany: Springer
-
J. Lai, R. H. Deng, and Y. Li, "Fully secure cipertext-policy hiding CPABE, " in Information Security Practice and Experience. Heidelberg, Germany: Springer, 2011, pp. 24-39.
-
(2011)
Information Security Practice and Experience
, pp. 24-39
-
-
Lai, J.1
Deng, R.H.2
Li, Y.3
-
13
-
-
84897766928
-
Challenges on wireless heterogeneous networks for mobile cloud computing
-
Jun.
-
L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng, "Challenges on wireless heterogeneous networks for mobile cloud computing, " IEEE Wireless Commun., vol. 20, no. 3, pp. 34-44, Jun. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.3
, pp. 34-44
-
-
Lei, L.1
Zhong, Z.2
Zheng, K.3
Chen, J.4
Meng, H.5
-
14
-
-
84961990862
-
Big data-driven optimization for mobile networks toward 5G
-
Jan./Feb.
-
K. Zheng, et al., "Big data-driven optimization for mobile networks toward 5G, " IEEE Netw., vol. 30, no. 1, pp. 44-51, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 44-51
-
-
Zheng, K.1
-
15
-
-
84962028249
-
Big data in mobile social networks: A QoE-oriented framework
-
Jan./Feb.
-
Z. Su, Q. Xu, and Q. Qi, "Big data in mobile social networks: A QoE-oriented framework, " IEEE Netw., vol. 30, no. 1, pp. 52-57, Jan./Feb. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.1
, pp. 52-57
-
-
Su, Z.1
Xu, Q.2
Qi, Q.3
-
16
-
-
84940510005
-
Engineering searchable encryption of mobile cloud networks: When QoE meets QoP
-
Aug.
-
H. Li, D. Liu, Y. Dai, and T. H. Luan, "Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, " IEEE Wireless Commun., vol. 22, no. 4, pp. 74-80, Aug. 2015.
-
(2015)
IEEE Wireless Commun.
, vol.22
, Issue.4
, pp. 74-80
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
-
17
-
-
84973579525
-
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
-
May/Jun.
-
H. Li, et al., "Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 3, pp. 312-325, May/Jun. 2016, doi: 10.1109/TDSC.2015.2406704.
-
(2016)
IEEE Trans. Depend. Secure Comput.
, vol.13
, Issue.3
, pp. 312-325
-
-
Li, H.1
-
18
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
Oct.
-
K. Frikken, M. Atallah, and J. Li, "Attribute-based access control with hidden policies and hidden credentials, " IEEE Trans. Comput., vol. 55, no. 10, pp. 1259-1270, Oct. 2006.
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
19
-
-
58049192731
-
Attribute-based content distribution with hidden policy
-
S. Yu, K. Ren, and W. Lou, "Attribute-based content distribution with hidden policy, " in Proc. Secure Netw. Protocols (NPSec), Orlando, FL, USA, 2008, pp. 39-44.
-
(2008)
Proc. Secure Netw. Protocols (NPSec), Orlando, FL, USA
, pp. 39-44
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
20
-
-
84871975909
-
Expressive CP-ABE with partially hidden access structures
-
J. Lai, R. H. Deng, and Y. Li, "Expressive CP-ABE with partially hidden access structures, " in Proc. ASIACCS, Seoul, South Korea, 2012, pp. 18-19.
-
(2012)
Proc. ASIACCS, Seoul, South Korea
, pp. 18-19
-
-
Lai, J.1
Deng, R.H.2
Li, Y.3
-
21
-
-
84885145341
-
Attribute-based secure data sharing with hidden policies in smart grid
-
Nov.
-
J. Hur, "Attribute-based secure data sharing with hidden policies in smart grid, " IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 11, pp. 2171-2180, Nov. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.11
, pp. 2171-2180
-
-
Hur, J.1
-
23
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
24
-
-
84961742903
-
Secure and verifiable policy update outsourcing for big data access control in the cloud
-
Dec.
-
K. Yang, X. Jia, and K. Ren, "Secure and verifiable policy update outsourcing for big data access control in the cloud, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 12, pp. 3461-3470, Dec. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.12
, pp. 3461-3470
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
25
-
-
84888990465
-
When private set intersection meets big data: An efficient and scalable protocol
-
C. Dong, L. Chen, and Z. Wen, "When private set intersection meets big data: An efficient and scalable protocol, " in Proc. CCS, Berlin, Germany, 2013, pp. 789-800.
-
(2013)
Proc. CCS, Berlin, Germany
, pp. 789-800
-
-
Dong, C.1
Chen, L.2
Wen, Z.3
|