Cellular automata Signature Based Data Sharing in Cloud Computing
Abstract
Full Text:
PDFReferences
J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A protected distributed computing based structure for enormous information data administration of keen network," IEEE Trans. Cloud Comput., vol. 3, no. 2, pp. 233– 244, Apr./Jun. 2015.
A. Balu and K. Kuppusamy, "An expressive and provably secure ciphertext-strategy property based encryption," Inf. Sci., vol. 276, no. 4, pp. 354– 362, Aug. 2014.
M. Belenkiy, J. Camenisch, M. Pursue, M. Kohlweiss, A. Lysyanskaya, and H. Shacham, "Randomizable confirmations and delegatable unknown qualifications," in Proc. 29th Annu. Int. Cryptol. Conf., 2009, pp. 108– 125.
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-strategy attributebased encryption," in Proc. IEEE Symp. Secur. Security, May 2007, pp. 321– 334.
D. Boneh, B. Lynn, and H. Shacham, "Short marks from the Weil matching," J. Cryptol., vol. 17, no. 4, pp. 297– 319, 2004.
M. Pursue, "Multi-expert property based encryption," in Proc. fourth Conf. Hypothesis Cryptogr., 2007, pp. 515– 534.
M. Pursue and S. S. M. Chow, "Enhancing protection and security in multiauthority property based encryption," in Proc. sixteenth ACM Conf. Comput. Commun. Secur., 2009, pp. 121– 130.
Refbacks
- There are currently no refbacks.