Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference25 articles.
1. Bessani, A., Correia, M., Quaresma, B., Andre, F., & Sousa, P. (2011). DEPSKY: Dependable and secure storage in a cloud-of clouds. In Proceedings of the sixth conference on computer systems (Eurosys’11), pp. 31–46.
2. Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., & Lambrinoudakis, C. (2011) Cryptography goes to the cloud. In Proceedings of STA 2011 workshops, CCIS 187 (pp. 190–197). Berlin: Springer.
3. Shamir, A. (1979). How to share a secret. Communications of the Association for Computing Machinery, 22(11), 612–613.
4. Nirmala, S. J., Bhanu, S. M. S., & Patel, A. A. (2012). A comparative study of the secret sharing algorithms for secure data in the cloud. International Journal on Cloud Computing: Services and Architecture, 2(4), 63–71.
5. Simonite, T. (2012). To keep passwords safe from hackers, just break them into bits. Technology Review.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Regulatable Mechanism for Transacting Data Assets;IEEE Internet of Things Journal;2023-12-15
2. Distributed authentication framework for Hadoop based bigdata environment;Journal of Ambient Intelligence and Humanized Computing;2021-10-11
3. Blockchain Based Authentication Framework for Kerberos Enabled Hadoop Clusters;Advances in Intelligent Systems and Computing;2021
4. 5G Networks;Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society;2021
5. Secret Sharing Based BLMQ Signature Generation;Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy;2020-01-10