nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
|
Lu, Yang |
|
2016 |
62 |
C |
p. 140-147 8 p. |
artikel |
2 |
Batch Public Key Cryptosystem with batch multi-exponentiation
|
Wu, Qianhong |
|
2016 |
62 |
C |
p. 196-204 9 p. |
artikel |
3 |
Cloud Cryptography: Theory, Practice and Future Research Directions
|
Choo, Kim-Kwang Raymond |
|
2016 |
62 |
C |
p. 51-53 3 p. |
artikel |
4 |
Cloud data integrity checking with an identity-based auditing mechanism from RSA
|
Yu, Yong |
|
2016 |
62 |
C |
p. 85-91 7 p. |
artikel |
5 |
Contents
|
|
|
2016 |
62 |
C |
p. iii-iv nvt p. |
artikel |
6 |
Distributed scheduling with probabilistic and fuzzy classifications of processes
|
Bagchi, Susmit |
|
2016 |
62 |
C |
p. 1-16 16 p. |
artikel |
7 |
Editorial Board
|
|
|
2016 |
62 |
C |
p. IFC- 1 p. |
artikel |
8 |
Efficient and privacy-preserving skyline computation framework across domains
|
Liu, Ximeng |
|
2016 |
62 |
C |
p. 161-174 14 p. |
artikel |
9 |
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
|
Yang, Xu |
|
2016 |
62 |
C |
p. 190-195 6 p. |
artikel |
10 |
Enabled/disabled predicate encryption in clouds
|
Huang, Shi-Yuan |
|
2016 |
62 |
C |
p. 148-160 13 p. |
artikel |
11 |
Entangled cloud storage
|
Ateniese, Giuseppe |
|
2016 |
62 |
C |
p. 104-118 15 p. |
artikel |
12 |
Garbled computation in cloud
|
Wang, Yongge |
|
2016 |
62 |
C |
p. 54-65 12 p. |
artikel |
13 |
Highly privacy-protecting data sharing in a tree structure
|
Canard, S. |
|
2016 |
62 |
C |
p. 119-127 9 p. |
artikel |
14 |
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud
|
Zhou, Yunya |
|
2016 |
62 |
C |
p. 128-139 12 p. |
artikel |
15 |
Key based data analytics across data centers considering bi-level resource provision in cloud computing
|
Zhang, Jiangtao |
|
2016 |
62 |
C |
p. 40-50 11 p. |
artikel |
16 |
Memory leakage-resilient searchable symmetric encryption
|
Dai, Shuguang |
|
2016 |
62 |
C |
p. 76-84 9 p. |
artikel |
17 |
On the energy footprint of I/O management in Exascale HPC systems
|
Dorier, Matthieu |
|
2016 |
62 |
C |
p. 17-28 12 p. |
artikel |
18 |
Probability-based reversible image authentication scheme for image demosaicking
|
Hu, Yu-Chen |
|
2016 |
62 |
C |
p. 92-103 12 p. |
artikel |
19 |
Provably secure robust optimistic fair exchange of distributed signatures
|
Wang, Yujue |
|
2016 |
62 |
C |
p. 29-39 11 p. |
artikel |
20 |
Secure searches in the cloud: A survey
|
Han, Fei |
|
2016 |
62 |
C |
p. 66-75 10 p. |
artikel |
21 |
Two Schemes of Privacy-Preserving Trust Evaluation
|
Yan, Zheng |
|
2016 |
62 |
C |
p. 175-189 15 p. |
artikel |