Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Ateniese, Giuseppe, Antonio Faonio, and Seny Kamara. "Leakage-resilient identification schemes from zero-knowledge proofs of storage."
    2. Cisco visual networking index: Global mobile data traffic forecast update, 2013–2018, February 5, 2014.
    3. Hao, Zhuo, Sheng Zhong, and Nenghai Yu. "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability."
    4. Secure Hash Standard (SHS), National Institute of Standards and Technology (NIST), FIPS PUB 180
    5. Liu, Joseph K., et al. "Fine-grained two-factor access control for web-based cloud computing services
    6. Sebé, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., & Quisquater, J. J. (2008). Efficient remote data possession checking in critical information infrastructures.
    7. Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009, September). Enabling public verifiability and data dynamics for storage security in cloud computing
    8. PauloS.L.M. Barreto and Michael Naehrig. Pairingfriendly elliptic-curves of prime order. In Bart Preneel and Stafford Tavares, editors, Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, pages 319–331. Springer Berlin Heidelberg,2006
    9.  A. Barsoum and A. Hasan. Enabling dynamic data and indirectmutual trust for cloud computing storage systems. Parallel andDistributed Systems, IEEE Transactions on, 24(12):2375–2385, Dec2013.
    10. Matt Blaze, GerritBleumer, and Martin Strauss. Divertible protocols and atomic proxy cryptography. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT’98, volume 1403 of LNCS,pages 127– 144. Springer Berlin / Heidelberg, 1998
    11. Dan Boneh and Xavier Boyen. Efficient selective identity-based encryption without random oracles. Journal of Cryptology (JoC), 24(4):659–693, 2011. early version in Eurocrypt 2004.
    12. Dan Boneh, Ben Lynn, and HovavShacham. Short signatures from the Weil pairing. In Colin Boyd, editor, Advances in Cryptology– ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 514– 532. Springer Berlin Heidelberg, 2001.
    13. Towards Secure Data Distribution Systems inMobile Cloud ComputingJiang Zhang, Zhenfeng Zhang, and Hui Guo
    14. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability Author: Z. Hao, S. Zhong
    15. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement Author: Z. Fu, K. Ren
    16. Leakage-Resilient Identification Schemes from ZeroKnowledge Proofs of Storage Author: G. Ateniese, A. Faonio, and S. Kamara

Recent Article