Author:
Xu Peng,Chen Hongwu,Zou Deqing,Jin Hai
Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Kaufman LM (2009) Data security in the world of cloud computing. IEEE Secur Priv 7:61–64
2. Almorsy M, Grundy J, Müller I (2010) An analysis of the cloud computing security problem. In: The Proceedings of the 2010 Asia Pacific cloud workshop co-located with APSEC2010, IEEE, pp 1–6
3. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: Nyberg K (ed) EUROCRYPT 1998, LNCS, Springer, Heidelberg, 1403, pp 127–144
4. Ibraimi L, Tang Q, Hartel P et al (2008) A type-and-identity-based proxy re-encryption scheme and its application in healthcare. In: Secure Data Management 2008, LNCS, Springer, Heidelberg, 5159, pp 185–198
5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Joe K (ed) CRYPTO 2001, LNCS, Springer, Heidelberg, 2139, pp 213–229
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献