default search action
Future Generation Computer Systems, Volume 62
Volume 62, September 2016
- Susmit Bagchi:
Distributed scheduling with probabilistic and fuzzy classifications of processes. 1-16 - Matthieu Dorier, Orcun Yildiz, Shadi Ibrahim, Anne-Cécile Orgerie, Gabriel Antoniu:
On the energy footprint of I/O management in Exascale HPC systems. 17-28 - Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. 29-39 - Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based data analytics across data centers considering bi-level resource provision in cloud computing. 40-50
- Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Lei Zhang:
Cloud Cryptography: Theory, Practice and Future Research Directions. 51-53 - Yongge Wang, Qutaibah M. Malluhi, Khaled Md. Khan:
Garbled computation in cloud. 54-65 - Fei Han, Jing Qin, Jiankun Hu:
Secure searches in the cloud: A survey. 66-75 - Shuguang Dai, Huige Li, Fangguo Zhang:
Memory leakage-resilient searchable symmetric encryption. 76-84 - Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. 85-91 - Yu-Chen Hu, Chun-Chi Lo, Wu-Lin Chen:
Probability-based reversible image authentication scheme for image demosaicking. 92-103 - Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled cloud storage. 104-118 - Sébastien Canard, Julien Devigne:
Highly privacy-protecting data sharing in a tree structure. 119-127 - Yunya Zhou, Hua Deng, Qianhong Wu, Bo Qin, Jianwei Liu, Yong Ding:
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud. 128-139 - Yang Lu, Jiguo Li:
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. 140-147 - Shi-Yuan Huang, Chun-I Fan, Yi-Fan Tseng:
Enabled/disabled predicate encryption in clouds. 148-160 - Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Haiyong Bao:
Efficient and privacy-preserving skyline computation framework across domains. 161-174 - Zheng Yan, Wenxiu Ding, Valtteri Niemi, Athanasios V. Vasilakos:
Two Schemes of Privacy-Preserving Trust Evaluation. 175-189 - Xu Yang, Xinyi Huang, Joseph K. Liu:
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. 190-195 - Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu, Weiran Liu, Jianwei Liu, Yong Ding:
Batch Public Key Cryptosystem with batch multi-exponentiation. 196-204
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.