nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A design for cloud-assisted Fair-Play Management System of online contests with provable security
|
Wang, Wei |
|
2015 |
52 |
C |
p. 137-146 10 p. |
artikel |
2 |
A fast and resource efficient mining algorithm for discovering frequent patterns in distributed computing environments
|
Lin, Kawuu W. |
|
2015 |
52 |
C |
p. 49-58 10 p. |
artikel |
3 |
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing
|
Lin, Hui |
|
2015 |
52 |
C |
p. 125-136 12 p. |
artikel |
4 |
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
|
Liang, Kaitai |
|
2015 |
52 |
C |
p. 95-108 14 p. |
artikel |
5 |
A simulation framework for priority scheduling on heterogeneous clusters
|
Çavdar, Derya |
|
2015 |
52 |
C |
p. 37-48 12 p. |
artikel |
6 |
BASE analysis of NoSQL database
|
Ganesh Chandra, Deka |
|
2015 |
52 |
C |
p. 13-21 9 p. |
artikel |
7 |
Cloud Computing: Security, Privacy and Practice
|
Xiang, Yang |
|
2015 |
52 |
C |
p. 59-60 2 p. |
artikel |
8 |
Contents
|
|
|
2015 |
52 |
C |
p. iii-iv nvt p. |
artikel |
9 |
Editorial Board
|
|
|
2015 |
52 |
C |
p. IFC- 1 p. |
artikel |
10 |
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing
|
Tang, Shaohua |
|
2015 |
52 |
C |
p. 116-124 9 p. |
artikel |
11 |
Improving the predictability of distributed stream processors
|
Basanta-Val, P. |
|
2015 |
52 |
C |
p. 22-36 15 p. |
artikel |
12 |
Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications
|
Zhang, Jie |
|
2015 |
52 |
C |
p. 109-115 7 p. |
artikel |
13 |
Remote data possession checking with enhanced security for cloud storage
|
Yu, Yong |
|
2015 |
52 |
C |
p. 77-85 9 p. |
artikel |
14 |
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption
|
Liu, Jianghua |
|
2015 |
52 |
C |
p. 67-76 10 p. |
artikel |
15 |
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure
|
Dai, Hongjun |
|
2015 |
52 |
C |
p. 147-155 9 p. |
artikel |
16 |
Server-aided anonymous attribute-based authentication in cloud computing
|
Liu, Zhusong |
|
2015 |
52 |
C |
p. 61-66 6 p. |
artikel |
17 |
Taxonomies of workflow scheduling problem and techniques in the cloud
|
Smanchat, Sucha |
|
2015 |
52 |
C |
p. 1-12 12 p. |
artikel |
18 |
Towards secure and reliable cloud storage against data re-outsourcing
|
Jiang, Tao |
|
2015 |
52 |
C |
p. 86-94 9 p. |
artikel |