no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
|
Qin, Zhen |
|
2017 |
54 |
P1 |
p. 55-60 |
article |
2 |
A two-party privacy preserving set intersection protocol against malicious users in cloud computing
|
Cao, Xuefei |
|
2017 |
54 |
P1 |
p. 41-45 |
article |
3 |
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens
|
Han, Gang |
|
2017 |
54 |
P1 |
p. 20-28 |
article |
4 |
Cloud computing security and privacy: Standards and regulations
|
Yu, Yong |
|
2017 |
54 |
P1 |
p. 1-2 |
article |
5 |
Identity-based provable data possession revisited: Security analysis and generic construction
|
Liu, Hongyu |
|
2017 |
54 |
P1 |
p. 10-19 |
article |
6 |
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
|
Odelu, Vanga |
|
2017 |
54 |
P1 |
p. 3-9 |
article |
7 |
Prelim 3 Editorial board
|
|
|
2017 |
54 |
P1 |
p. iii |
article |
8 |
Provable data transfer from provable data possession and deletion in cloud storage
|
Xue, Liang |
|
2017 |
54 |
P1 |
p. 46-54 |
article |
9 |
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing
|
Ren, Wei |
|
2017 |
54 |
P1 |
p. 29-35 |
article |
10 |
Verifiable delegated quantum computation with χ-type entangled states
|
Tan, Xiaoqing |
|
2017 |
54 |
P1 |
p. 36-40 |
article |