Security and privacy protection in cloud computing: Discussions and challenges
Top Cited Papers
- 15 June 2020
- journal article
- review article
- Published by Elsevier BV in Journal of Network and Computer Applications
- Vol. 160, 102642
- https://doi.org/10.1016/j.jnca.2020.102642
Abstract
No abstract availableThis publication has 72 references indexed in Scilit:
- Public key encryption with keyword search secure against keyword guessing attacks without random oracleInformation Sciences, 2013
- Efficient verifiable fuzzy keyword search over encrypted data in cloud computingComputer Science and Information Systems, 2013
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword searchTheoretical Computer Science, 2012
- Provably secure threshold public-key encryption with adaptive security and short ciphertextsInformation Sciences, 2012
- Further observation on proxy re-encryption with keyword searchJournal of Systems and Software, 2012
- Proxy re-encryption with keyword searchInformation Sciences, 2010
- Trapdoor security in a searchable public-key encryption scheme with a designated testerJournal of Systems and Software, 2010
- Improvement of identity-based proxy multi-signature schemeJournal of Systems and Software, 2009
- Proposed NIST standard for role-based access controlACM Transactions on Information and System Security, 2001
- How to share a secretCommunications of the ACM, 1979