Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. P.Mell and T.Grance, "The NIST meaning of distributed computing," National Institute of Standards and Technology, vol. 53, no. 6, p. 50, 2009.
    2. S. Kamara and Lauter, "Cryptographic dispersed stockpiling," in Proceedings of14th fiscal cryptography and information protection Springer, 2010, pp. 136– 149.
    3. K. Ren, C. Wang, and Q. Wang, "Security challenges for public cloud," IEEE network Computing, vol. 16, no. 1, pp. 69– 73, 2012.
    4. A. Sahai and B. Waters, "Fleecy character based encryption," in Proceedings of 24th Annual global symposium on hypothesis and functions of Cryptographic methods. Springe, 2005, pp. 457– 473.
    5. R. Ostrovsky, Sahai, and Waters, "Quality based encryption with non-monotonic entrance structures," in procedures of fourteenth ACM meeting on cpu and exchanges security. ACM, 2014, pp. 195– 203.
    6. A. Lewko, Okamoto, Sahai, K. Takashima, and Waters, "Totally secure commonsense encryption: quality-based encryption and (different leveled) internal thing encryption," in Proceedings of 29th Annual International Gathering on the premise and appliances of Cryptographic methods. Springer, 2010, pp. 62– 91.
    7. V. Goyal, O. Pandey, Sahai and Waters, "Characteristic found encryption for finegrained get to control of encoded information," in complaints of thirteenth ACM meeting on mainframe and correspondences protection. ACM, 2006, pp. 89– 98.
    8. N. Attrapadung, B. Libert, and E. Panafieu, "Expressive keypolicy quality based encryption with steady size ciphertexts," in Proceedings of fourteenth global convention on exercise and concept in Open Key Cryptography. Springer, 2011, pp. 90– 108.
    9. J. Bethen court, Sahai, and Waters, "Ciphertextstrategy quality based encryption," in procedures of IEEE convention on protection and solitude. IEEE, 2007, pp. 321– 334.
    10. B. Waters, "Figure content strategy quality based encryption”: An expressive, proficient, and provably secure acknowledgment," in Proceedings of fourteenth International Meeting on perform and speculation in open Key Cryptography. ,2011, pp. 53– 70.

Recent Article