4.4 Article Proceedings Paper

Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Hardware & Architecture

Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures

Jian Xu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

Jian Shen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Multi-key privacy-preserving deep learning in cloud computing

Ping Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies

Jiaojiao Jiang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Insight of the protection for data security under selective opening attacks

Zhengan Huang et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Software Engineering

RIoTBench: An IoT benchmark for distributed stream processing systems

Anshu Shukla et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2017)

Article Computer Science, Software Engineering

An overview of Fog computing and its security issues

Ivan Stojmenovic et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2016)

Article Computer Science, Hardware & Architecture

Verifiable Computation over Large Database with Incremental Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Lattice-based linearly homomorphic signatures in the standard model

Wenbin Chen et al.

THEORETICAL COMPUTER SCIENCE (2016)

Article Computer Science, Hardware & Architecture

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks

Sheng Wen et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Hardware & Architecture

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Theory & Methods

Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

Suqing Lin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges

Saeid Abolfazli et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

Modeling the Propagation of Worms in Networks: A Survey

Yini Wang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Theory & Methods

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Theory & Methods

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Identity-based chameleon hashing and signatures without key exposure

Xiaofeng Chen et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

Outsourcing computation of modular exponentiations in cloud computing

Xu Ma et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2013)

Article Computer Science, Theory & Methods

Modeling Propagation Dynamics of Social Network Worms

Sheng Wen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

A survey of mobile cloud computing: architecture, applications, and approaches

Hoang T. Dinh et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2013)

Article Mathematics

Public key exchange using matrices over group rings

Delaram Kahrobaei et al.

GROUPS COMPLEXITY CRYPTOLOGY (2013)

Article Computer Science, Hardware & Architecture

On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field ZN

Xiaofeng Liao et al.

IEEE TRANSACTIONS ON COMPUTERS (2010)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of the public key encryption based on multiple chaotic systems

Linhua Zhang

CHAOS SOLITONS & FRACTALS (2008)

Article Engineering, Electrical & Electronic

Public-key encryption based on Chebyshev polynomials

L Kocarev et al.

CIRCUITS SYSTEMS AND SIGNAL PROCESSING (2005)

Article Engineering, Electrical & Electronic

Chaos and cryptography: Block encryption ciphers based on chaotic maps

G Jakimoski et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2001)