Author:
Yakoob Sk.,Krishna Reddy V.,Dastagiraiah C.
Reference14 articles.
1. Zhihua Xia, Xingming Sun,: A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE trans on parallel and distributed systems, vol. 99, pp: 340–352, (2015).
2. Ren. K., Wang. C., Wang. Q.,: Security challenges for the public cloud. IEEE Internet Computing, vol. 16, pp. 69–73, (2012).
3. Kamara. S., Lauter. K,,: Cryptographic cloud storage. Financial Cryptography and Data Security. Springer, pp. 136–149 (2010).
4. Gentry. C.: “A fully homomorphic encryption scheme,” Ph.D. dissertation, Stanford University, (2009).
5. Wang. C, Ren. K, Yu. S, K. M. R. Urs.: Achieving usable and privacy-assured similarity search over outsourced cloud data. INFOCOM, 2012 Proceedings IEEE. IEEE, pp. 451–459 (2012).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Multi User Authentication for Reliable Data Storage in Cloud Computing;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2024-03-11