ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
Authors
Keywords
-
Journal
WIRELESS PERSONAL COMMUNICATIONS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2020-09-07
DOI
10.1007/s11277-020-07756-7
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases
- (2019) Mohamed Abdel-Basset et al. ARTIFICIAL INTELLIGENCE IN MEDICINE
- Chinese remainder theorem-based two-in-one image secret sharing with three decoding options
- (2018) Xuehu Yan et al. DIGITAL SIGNAL PROCESSING
- A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem
- (2018) Xingxing Jia et al. INFORMATION SCIENCES
- Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
- (2017) Sikhar Patranabis et al. IEEE TRANSACTIONS ON COMPUTERS
- Secure and Efficient Cloud Data Deduplication With Randomized Tag
- (2017) Tao Jiang et al. IEEE Transactions on Information Forensics and Security
- Secure similarity-based cloud data deduplication in Ubiquitous city
- (2017) Jinfeng Liu et al. Pervasive and Mobile Computing
- Two-Factor Data Security Protection Mechanism for Cloud Storage System
- (2016) Joseph K. Liu et al. IEEE TRANSACTIONS ON COMPUTERS
- Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
- (2016) Junbeom Hur et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
- (2015) Kaitai Liang et al. Future Generation Computer Systems-The International Journal of eScience
- Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
- (2015) Taeho Jung et al. IEEE Transactions on Information Forensics and Security
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- (2015) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Collaborative and secure sharing of healthcare data in multi-clouds
- (2015) Benjamin Fabian et al. INFORMATION SYSTEMS
- Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
- (2014) Piotr K. Tysowski et al. IEEE Transactions on Cloud Computing
- Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
- (2013) Kan Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security and privacy for storage and computation in cloud computing
- (2013) Lifei Wei et al. INFORMATION SCIENCES
- Cloud computing security: The scientific challenge, and a survey of solutions
- (2013) Mark D. Ryan JOURNAL OF SYSTEMS AND SOFTWARE
- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
- (2012) Ming Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Privacy and security issues in cloud computing: The role of institutions and institutional evolution
- (2012) Nir Kshetri TELECOMMUNICATIONS POLICY
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search