Author:
Prassanna J.,Punitha K.,Neelanarayanan V.
Reference9 articles.
1. “Nguyen, Cloud Trends and Security Challenges”, keynote, the 3rd International Workshop on Security and Communication Networks (IWSCN;Chunming Rong;May, Gjøvik Norway,2011
2. Toward Accountability in the Cloud,” Internet Computing;Pearson;IEEE,2011
3. Cong Wang; Qian Wang; Kui Ren; Wenjing Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” INFOCOM, 2010 Proceedings IEEE, vol., no., pp.1,9, 14-19 March 2010.
4. “Short Signatures from the Weil Pairing.”;Boneh;Journal of Cryptology,2004
5. Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, and James Riely. 2009. “Towards a theory of accountability and audit”. In Proceedings of the 14th European conference on Research in computer security (ESORICS’09), Michael Backes and Peng Ning (Eds.). Springer-Verlag, Berlin, Heidelberg, 152-167.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献