SEMKC: secure and efficient computation over outsourced data encrypted under multiple keys
SK Nayak, S Tripathy - IEEE Transactions on Emerging Topics …, 2018 - ieeexplore.ieee.org
Cloud computing is a popular paradigm to facilitate massive data computation and storage.
The issue is challenging as data owners outsource their data after encryption to preserve …
The issue is challenging as data owners outsource their data after encryption to preserve …
Compact E-cash with efficient coin-tracing
B Lian, G Chen, J Cui, M Ma - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Compact E-cash achieves an efficient system by withdrawing 2n coins within O (1)
operations and storing the coins in O (n) bits. For preventing a double-spender from …
operations and storing the coins in O (n) bits. For preventing a double-spender from …
Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
G Pareek, BR Purushothama - Sādhanā, 2018 - Springer
Users share a group key to decrypt encryptions for the group using a group key
management scheme. In this paper, we propose a re-encryption-based group key …
management scheme. In this paper, we propose a re-encryption-based group key …
A novice group sharing method for public cloud
C Li, C Yang - 2018 IEEE 11th International Conference on …, 2018 - ieeexplore.ieee.org
Cloud Computing has been envisioned as the next-wave system architectures of IT. Cloud
storage service brings benefit of not only low cost and scalability, but also great …
storage service brings benefit of not only low cost and scalability, but also great …
Securing named data networks: Challenges and the way forward
Despite decades of research on the Internet security, we constantly hear about mega data
breaches and malware infections affecting hundreds of millions of hosts. The key reason is …
breaches and malware infections affecting hundreds of millions of hosts. The key reason is …
[PDF][PDF] 无双线性对的基于证书多域条件代理重加密方案
徐洁如, 陈克非, 沈忠华, 徐晓栋 - 密码学报, 2018 - jcr.cacrnet.org.cn
已有的基于证书条件代理重加密(CB-CPRE) 方案有效保护了云中的数据,
解决了复杂的证书管理问题和密钥托管问题. 但是现有的基于证书条件代理重加密方案仍然存在 …
解决了复杂的证书管理问题和密钥托管问题. 但是现有的基于证书条件代理重加密方案仍然存在 …
[PDF][PDF] SECRBAC: Secure Data In The Clouds
DJR Kumar, M CHANDINI - International Journal of Research, 2018 - ijsetr.com
Most current security solutions are based on perimeter security. However, Cloud computing
breaks the organization perimeters. When data resides in the Cloud, they reside outside the …
breaks the organization perimeters. When data resides in the Cloud, they reside outside the …
Accountable content stores for information centric networks
GC Scott - US Patent 9,992,281, 2018 - Google Patents
A set of Content Store nodes of an information-centric network (ICN) can cache data, and
can processes an Interest for this data based on a domain assigned to the requested data …
can processes an Interest for this data based on a domain assigned to the requested data …
Interest return control message
One embodiment provides a system that facilitates processing of error-condition information
associated with a content-centric network (CCN) message transmitted over a network …
associated with a content-centric network (CCN) message transmitted over a network …
Method and apparatus for pre-fetching remote content based on static and dynamic recommendations
RLB Silberstein, MF Plass, RC Meike - US Patent 10,129,365, 2018 - Google Patents
A data-caching system facilitates pre-loading a cache with content objects that are likely to
be of interest to a client device, as determined based on their correlation to other content …
be of interest to a client device, as determined based on their correlation to other content …