[HTML][HTML] A survey of fault tolerance in cloud computing
Cloud computing has brought about a transformation in the delivery model of information
technology from a product to a service. It has enabled the availability of various software …
technology from a product to a service. It has enabled the availability of various software …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Secure multi-party computation: theory, practice and applications
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
enables distributed parties to jointly compute an arbitrary functionality without revealing their …
A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …
wearable equipments are able to become new intelligent terminals to provide services for …
Enabling efficient and geometric range query with access control over encrypted spatial data
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …
An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …
transportation system has promoted the rapid development of vehicular ad-hoc networks …
A privacy-preserving and untraceable group data sharing scheme in cloud computing
J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …
Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …