A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
出版年份 2018 全文链接
标题
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
作者
关键词
-
出版物
Security and Communication Networks
Volume 2018, Issue -, Pages 1-7
出版商
Hindawi Limited
发表日期
2018-06-07
DOI
10.1155/2018/7254305
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Enhancing network capacity by weakening community structure in scale-free network
- (2018) Jun Cai et al. Future Generation Computer Systems-The International Journal of eScience
- Anonymous and Traceable Group Data Sharing in Cloud Computing
- (2018) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- DivORAM: Towards a practical oblivious RAM with variable block size
- (2018) Zheli Liu et al. INFORMATION SCIENCES
- A new dynamic firefly algorithm for demand estimation of water resources
- (2018) Hui Wang et al. INFORMATION SCIENCES
- HybridORAM: Practical oblivious cloud storage with constant bandwidth
- (2018) Bo Li et al. INFORMATION SCIENCES
- Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
- (2018) Chong-zhi Gao et al. INFORMATION SCIENCES
- Lattice-based searchable public-key encryption scheme for secure cloud storage
- (2018) Run Xie et al. International Journal of Web and Grid Services
- Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
- (2018) Jian Xu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
- (2018) Jian Shen et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Distance metric optimization driven convolutional neural network for age invariant face recognition
- (2018) Ya Li et al. PATTERN RECOGNITION
- An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
- (2018) Qun Lin et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
- (2018) Hongwei Li et al. IEEE Transactions on Emerging Topics in Computing
- Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels
- (2017) Lisheng Fan et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Insight of the protection for data security under selective opening attacks
- (2017) Zhengan Huang et al. INFORMATION SCIENCES
- Effective Query Grouping Strategy in Clouds
- (2017) Qin Liu et al. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
- Finger vein secure biometric template generation based on deep learning
- (2017) Yi Liu et al. SOFT COMPUTING
- New directly revocable attribute-based encryption scheme and its application in cloud storage environment
- (2016) Hao Wang et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Verifiable Computation over Large Database with Incremental Updates
- (2016) Xiaofeng Chen et al. IEEE TRANSACTIONS ON COMPUTERS
- Lattice-based linearly homomorphic signatures in the standard model
- (2016) Wenbin Chen et al. THEORETICAL COMPUTER SCIENCE
- Online/Offline Ciphertext Retrieval on Resource Constrained Devices
- (2015) Peng Jiang et al. COMPUTER JOURNAL
- New Publicly Verifiable Databases with Efficient Updates
- (2015) Xiaofeng Chen et al. IEEE Transactions on Dependable and Secure Computing
- Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
- (2015) Rongmao Chen et al. IEEE Transactions on Information Forensics and Security
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- (2015) Jin Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
- (2015) Hongwei Li et al. IEEE Transactions on Emerging Topics in Computing
- OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
- (2015) Jin Li et al. IEEE Transactions on Cloud Computing
- EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid
- (2013) Hongwei Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Public key encryption with keyword search secure against keyword guessing attacks without random oracle
- (2013) Liming Fang et al. INFORMATION SCIENCES
- Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
- (2012) Peng Xu et al. IEEE TRANSACTIONS ON COMPUTERS
- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
- (2010) Qian Wang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Trapdoor security in a searchable public-key encryption scheme with a designated tester
- (2009) Hyun Sook Rhee et al. JOURNAL OF SYSTEMS AND SOFTWARE
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now