相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Secure attribute-based data sharing for resource-limited users in cloud computing
Jin Li et al.
COMPUTERS & SECURITY (2018)
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures
Jian Xu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
Jian Shen et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Multi-key privacy-preserving deep learning in cloud computing
Ping Li et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies
Jiaojiao Jiang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Insight of the protection for data security under selective opening attacks
Zhengan Huang et al.
INFORMATION SCIENCES (2017)
RIoTBench: An IoT benchmark for distributed stream processing systems
Anshu Shukla et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)
An overview of Fog computing and its security issues
Ivan Stojmenovic et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)
Verifiable Computation over Large Database with Incremental Updates
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON COMPUTERS (2016)
Lattice-based linearly homomorphic signatures in the standard model
Wenbin Chen et al.
THEORETICAL COMPUTER SCIENCE (2016)
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
Sheng Wen et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
New Publicly Verifiable Databases with Efficient Updates
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
Suqing Lin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie-Hellman assumption
Tian-Fu Lee
NONLINEAR DYNAMICS (2015)
Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
Saeid Abolfazli et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Modeling the Propagation of Worms in Networks: A Survey
Yini Wang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
New Algorithms for Secure Outsourcing of Modular Exponentiations
Xiaofeng Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Secure Deduplication with Efficient and Reliable Convergent Key Management
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Securely Outsourcing Attribute-Based Encryption with Checkability
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Identity-based chameleon hashing and signatures without key exposure
Xiaofeng Chen et al.
INFORMATION SCIENCES (2014)
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
Hong Lai et al.
NONLINEAR DYNAMICS (2014)
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Mohammad Sabzinejad Farash et al.
NONLINEAR DYNAMICS (2014)
Outsourcing computation of modular exponentiations in cloud computing
Xu Ma et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)
Modeling Propagation Dynamics of Social Network Worms
Sheng Wen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)
A survey of mobile cloud computing: architecture, applications, and approaches
Hoang T. Dinh et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2013)
Public key exchange using matrices over group rings
Delaram Kahrobaei et al.
GROUPS COMPLEXITY CRYPTOLOGY (2013)
On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field ZN
Xiaofeng Liao et al.
IEEE TRANSACTIONS ON COMPUTERS (2010)
Cryptanalysis of the public key encryption based on multiple chaotic systems
Linhua Zhang
CHAOS SOLITONS & FRACTALS (2008)
Public-key encryption based on Chebyshev polynomials
L Kocarev et al.
CIRCUITS SYSTEMS AND SIGNAL PROCESSING (2005)
Chaos and cryptography: Block encryption ciphers based on chaotic maps
G Jakimoski et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2001)