Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios
Authors
Keywords
-
Journal
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
Volume -, Issue -, Pages e4523
Publisher
Wiley
Online
2018-06-26
DOI
10.1002/cpe.4523
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Secure attribute-based data sharing for resource-limited users in cloud computing
- (2018) Jin Li et al. COMPUTERS & SECURITY
- Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
- (2018) Jian Xu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Multi-key privacy-preserving deep learning in cloud computing
- (2017) Ping Li et al. Future Generation Computer Systems-The International Journal of eScience
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
- (2017) Jiaojiao Jiang et al. IEEE Communications Surveys and Tutorials
- Insight of the protection for data security under selective opening attacks
- (2017) Zhengan Huang et al. INFORMATION SCIENCES
- Verifiable Computation over Large Database with Incremental Updates
- (2016) Xiaofeng Chen et al. IEEE TRANSACTIONS ON COMPUTERS
- Lattice-based linearly homomorphic signatures in the standard model
- (2016) Wenbin Chen et al. THEORETICAL COMPUTER SCIENCE
- An overview of Fog computing and its security issues
- (2015) Ivan Stojmenovic et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
- (2015) Sheng Wen et al. IEEE TRANSACTIONS ON COMPUTERS
- New Publicly Verifiable Databases with Efficient Updates
- (2015) Xiaofeng Chen et al. IEEE Transactions on Dependable and Secure Computing
- Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
- (2015) S. Lin et al. IEEE Transactions on Information Forensics and Security
- Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie–Hellman assumption
- (2015) Tian-Fu Lee NONLINEAR DYNAMICS
- Identity-based chameleon hashing and signatures without key exposure
- (2014) Xiaofeng Chen et al. INFORMATION SCIENCES
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- (2014) Hong Lai et al. NONLINEAR DYNAMICS
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- (2014) Mohammad Sabzinejad Farash et al. NONLINEAR DYNAMICS
- Outsourcing computation of modular exponentiations in cloud computing
- (2013) Xu Ma et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
- (2013) Saeid Abolfazli et al. IEEE Communications Surveys and Tutorials
- Modeling the Propagation of Worms in Networks: A Survey
- (2013) Yini Wang et al. IEEE Communications Surveys and Tutorials
- New Algorithms for Secure Outsourcing of Modular Exponentiations
- (2013) Xiaofeng Chen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Secure Deduplication with Efficient and Reliable Convergent Key Management
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Securely Outsourcing Attribute-Based Encryption with Checkability
- (2013) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Modeling Propagation Dynamics of Social Network Worms
- (2012) Sheng Wen et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A survey of mobile cloud computing: architecture, applications, and approaches
- (2011) Hoang T. Dinh et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$
- (2010) Xiaofeng Liao et al. IEEE TRANSACTIONS ON COMPUTERS
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- (2006) Linhua Zhang CHAOS SOLITONS & FRACTALS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started