-
1
-
-
84904352832
-
A review on the State-of-the-art privacy preserving approaches in e-health clouds
-
Jul
-
A. Abbas and S. U. Khan, "A review on the State-of-the-art privacy preserving approaches in e-health clouds, " IEEE J. Biomed. Health Informat., vol. 18, no. 1, pp. 1431-1441, Jul. 2014.
-
(2014)
IEEE J. Biomed. Health Informat
, vol.18
, Issue.1
, pp. 1431-1441
-
-
Abbas, A.1
Khan, S.U.2
-
2
-
-
84925291770
-
An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art
-
to be published
-
K. Alhamazani et al., "An overview of the commercial cloud monitoring tools: Research dimensions, design issues, state-of-the-art, " Computing, DOI: 10.1007/s00607-014-0398-5, 2014, to be published.
-
(2014)
Computing
-
-
Alhamazani, K.1
-
3
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
Jul
-
A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, "Towards secure mobile cloud computing: A survey, " Future Gen. Comput. Syst., vol. 29, no. 5, pp. 1278-1299, Jul. 2013.
-
(2013)
Future Gen. Comput. Syst
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
-
4
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Feb
-
L. Wei, H. Zhu, Z. Cao, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
-
(2014)
Inf. Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Chen, Y.4
Vasilakos, A.V.5
-
6
-
-
84923106787
-
Fast and scalable multi-way analysis of massive neural data
-
Mar
-
D. Chen et al., "Fast and scalable multi-way analysis of massive neural data, " IEEE Trans. Comput., vol. 64, no. 3, pp. 707-719, Mar. 2015. DOI: 10.1109/TC.2013.2295806.
-
(2015)
IEEE Trans. Comput
, vol.64
, Issue.3
, pp. 707-719
-
-
Chen, D.1
-
7
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
May
-
A. N. Khan, M. M. Kiah, S. A. Madani, M. Ali, and S. Shamshir-band, "Incremental proxy re-encryption scheme for mobile cloud computing environment, " J. Supercomput., vol. 68, no. 2, pp. 624-651, May 2014.
-
(2014)
J. Supercomput
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.N.1
Kiah, M.M.2
Madani, S.A.3
Ali, M.4
Shamshir-Band, S.5
-
8
-
-
84868123935
-
Efficient and provably-secure group key management scheme using key derivation
-
Y. Chen and W. Tzeng, "Efficient and provably-secure group key management scheme using key derivation, " in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295-302.
-
(2012)
Proc. IEEE 11th Int. Conf. TrustCom
, pp. 295-302
-
-
Chen, Y.1
Tzeng, W.2
-
9
-
-
84872004857
-
CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud
-
L. Xu, X. Wu, and X. Zhang, "CL-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud, " in Proc. 7th ACM Symp. Inf., Comput. Commun. Security, 2012, pp. 87-88.
-
(2012)
Proc. 7th ACM Symp. Inf., Comput. Commun. Security
, pp. 87-88
-
-
Xu, L.1
Wu, X.2
Zhang, X.3
-
11
-
-
84959540048
-
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
-
Sep
-
S. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds, " IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2107-2119, Sep. 2013.
-
(2013)
IEEE Trans. Knowl. Data Eng
, vol.26
, Issue.9
, pp. 2107-2119
-
-
Seo, S.1
Nabeel, M.2
Ding, X.3
Bertino, E.4
-
12
-
-
79960886232
-
Secure group key management using uni-directional proxy re-encryption schemes
-
Y. Chen, J. D. Tygar, and W. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes, " in Proc. IEEE INFOCOM, pp. 1952-1960.
-
Proc. IEEE INFOCOM
, pp. 1952-1960
-
-
Chen, Y.1
Tygar, J.D.2
Tzeng, W.3
-
13
-
-
0024645936
-
Petri Nets: Properties, analysis and applications
-
Apr
-
T. Murata, "Petri Nets: Properties, analysis and applications, " Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
14
-
-
70649083043
-
Satisfiability modulo theories: An appetizer
-
Lecture Notes in Computer Science
-
L. Moura and N. Bjrner, "Satisfiability modulo theories: An appetizer, " in Proc. Formal Methods, Found. Appl., vol. 5902, Lecture Notes in Computer Science, 2009, pp. 23-36.
-
(2009)
Proc. Formal Methods, Found. Appl
, vol.5902
, pp. 23-36
-
-
Moura, L.1
Bjrner, N.2
-
15
-
-
84878591000
-
A methodology for OSPF routing protocol verification
-
Changzhou, China, Dec
-
S. U. R. Malik, S. K. Srinivasan, S. U. Khan, and L. Wang, "A methodology for OSPF routing protocol verification, " in Proc. 12th Int. Conf. ScalCom, Changzhou, China, Dec. 2012, pp. 1-5.
-
(2012)
Proc. 12th Int. Conf. ScalCom
, pp. 1-5
-
-
Malik, S.U.R.1
Srinivasan, S.K.2
Khan, S.U.3
Wang, L.4
|