Author:
Dhawan Kanupriya,Sharma Meenakshi
Publisher
Springer International Publishing
Reference15 articles.
1. Hwang, J.-J., Chuang, H.-K., Hsu, Y.-C., Wu, C.-H.: A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service, National Science Council of Taiwan Government
2. Fan, C.-I., Huang, S.-Y.: Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE (2011)
3. Varalakshmi, P., Deventhiran, H.: Integrity Checking for Cloud Environment Using Encryption Algorithm. IEEE (2012)
4. Mohamed, E.M., EI-Etriby, S.: Randomness Testing of Modem Encryption Techniques in Cloud Environment. In: 8th International Conference on Informatics and Systems (2012)
5. Xu, Z., Martin, K.M.: Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. In: International Conference on Trust, Security and Privacy in Computing and Communications. IEEE (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献