Identity-based provable data possession revisited: Security analysis and generic construction (English)
- New search for: Liu, Hongyu
- New search for: Liu, Hongyu
- New search for: Mu, Yi
- New search for: Zhao, Jining
- New search for: Xu, Chunxiang
- New search for: Wang, Huaqun
- New search for: Chen, Leiting
- New search for: Yu, Yong
In:
Computer standards & interfaces
;
54
; 10-19
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:Identity-based provable data possession revisited: Security analysis and generic construction
-
Contributors:Liu, Hongyu ( author ) / Mu, Yi / Zhao, Jining / Xu, Chunxiang / Wang, Huaqun / Chen, Leiting / Yu, Yong
-
Published in:Computer standards & interfaces ; 54 ; 10-19
-
Publisher:
- New search for: Elsevier Science Publ. BV (North-Holland)
-
Place of publication:Amsterdam
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 535/3155/4550
- New search for: 54.21 / 54.21
- Further information on Basic classification
-
Keywords:
-
Classification:
Local classification TIB: 535/3155/4550 BKL: 54.21 / 54.21 Rechnerperipherie, Datenkommunikationshardware -
Source:
Table of contents – Volume 54
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Cloud computing security and privacy: Standards and regulationsYu, Yong / Miyaji, Atsuko / Au, Man Ho / Susilo, Willy et al. | 2017
- 3
-
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environmentOdelu, Vanga / Das, Ashok Kumar / Rao, Y. Sreenivasa / Kumari, Saru / Khan, Muhammad Khurram / Choo, Kim-Kwang Raymond et al. | 2016
- 10
-
Identity-based provable data possession revisited: Security analysis and generic constructionLiu, Hongyu / Mu, Yi / Zhao, Jining / Xu, Chunxiang / Wang, Huaqun / Chen, Leiting / Yu, Yong et al. | 2016
- 20
-
Characterizing the semantics of passwords: The role of Pinyin for Chinese NetizensHan, Gang / Yu, Yu / Li, Xiangxue / Chen, Kefei / Li, Hui et al. | 2016
- 29
-
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computingRen, Wei / Liu, Ran / Lei, Min / Choo, Kim-Kwang Raymond et al. | 2016
- 36
-
Verifiable delegated quantum computation with χ-type entangled statesTan, Xiaoqing / Zhang, Xiaoqian / Song, Tingting et al. | 2016
- 41
-
A two-party privacy preserving set intersection protocol against malicious users in cloud computingCao, Xuefei / Li, Hui / Dang, Lanjun / Lin, Yin et al. | 2016
- 46
-
Provable data transfer from provable data possession and deletion in cloud storageXue, Liang / Ni, Jianbing / Li, Yannan / Shen, Jian et al. | 2016
- 55
-
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computingQin, Zhen / Sun, Jianfei / Wahaballa, Abubaker / Zheng, Wentao / Xiong, Hu / Qin, Zhiguang et al. | 2016
- 61
-
Big Data. New approaches of modelling and managementGil, David / Song, Il-Yeol / Aldana, José F. / Trujillo, Juan et al. | 2017
- 64
-
PREFer: A prescription-based food recommender systemBianchini, Devis / De Antonellis, Valeria / De Franceschi, Nicola / Melchiori, Michele et al. | 2016
- 76
-
Application of Data Mining techniques to identify relevant Key Performance IndicatorsPeral, Jesús / Maté, Alejandro / Marco, Manuel et al. | 2016
- 86
-
Big Data normalization for massively parallel processing databasesGolov, Nikolay / Rönnbäck, Lars et al. | 2017
- 94
-
Towards a service architecture for master data exchange based on ISO 8000 with support to process large datasetsRivas, Bibiano / Merino, Jorge / Caballero, Ismael / Serrano, Manuel / Piattini, Mario et al. | 2016
- 105
-
Research on Big Data – A systematic mapping studyAkoka, Jacky / Comyn-Wattiau, Isabelle / Laoufi, Nabil et al. | 2017
- 117
-
Software Process Improvement and Capability Determination Conference 2016Clarke, Paul / Yilmaz, Murat et al. | 2017
- 119
-
Promoting MBA in the rail sector by deriving process-related evidence via MDSafeCerGallina, Barbara / Gómez-Martínez, Elena / Benac-Earle, Clara et al. | 2016
- 129
-
Teaching ISO/IEC 12207 software lifecycle processes: A serious game approachAydan, Ufuk / Yilmaz, Murat / Clarke, Paul M. / O’Connor, Rory V. et al. | 2016
- 139
-
MAMD 2.0: Environment for data quality processes implantation based on ISO 8000-6X and ISO/IEC 33000Carretero, Ana G. / Gualo, Fernando / Caballero, Ismael / Piattini, Mario et al. | 2016
- 152
-
Approach to the development of a Unified Framework for Safety Critical Software DevelopmentBujok, Andrzej Beniamin / MacMahon, Silvana Togneri / Grant, Peadar / Whelan, Dick / Rickard, William J. / McCaffery, Fergal et al. | 2016
- 162
-
A standard-based framework to integrate software work in small settingsSanchez-Gordon, Mary-Luz / de Amescua, Antonio / O’Connor, Rory V. / Larrucea, Xabier et al. | 2016
- 176
-
Integrating risk management in IT settings from ISO standards and management systems perspectivesBarafort, Béatrix / Mesquida, Antoni-Lluís / Mas, Antonia et al. | 2016
- 186
-
Model based process assessment for public financial and physical resource management processesGökalp, Ebru / Demirörs, Onur et al. | 2016
- 195
-
Standardization SDN&NFVLopez, Diego / Rafiee, Hosnieh / Bernardos, Carlos J. / Lopez-Millan, Gabriel / Marin-Lopez, Rafael et al. | 2017
- 197
-
Software defined networking architecture standardizationSchaller, Sibylle / Hood, Dave et al. | 2017
- 203
-
Network service orchestration standardization: A technology surveyRotsos, Charalampos / King, Daniel / Farshad, Arsham / Bird, Jamie / Fawcett, Lyndon / Georgalas, Nektarios / Gunkel, Matthias / Shiomoto, Kohei / Wang, Aijun / Mauthe, Andreas et al. | 2016
- 216
-
Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDNBlanco, Bego / Fajardo, Jose Oscar / Giannoulakis, Ioannis / Kafetzakis, Emmanouil / Peng, Shuping / Pérez-Romero, Jordi / Trajkovska, Irena / Khodashenas, Pouria S. / Goratti, Leonardo / Paolino, Michele et al. | 2016
- 229
-
Future mode of operations for 5G – The SELFNET approach enabled by SDN/NFVNeves, Pedro / Calé, Rui / Costa, Mário / Gaspar, Gonçalo / Alcaraz-Calero, Jose / Wang, Qi / Nightingale, James / Bernini, Giacomo / Carrozzo, Gino / Valdivieso, Ángel et al. | 2016
- 247
-
SDN-based service function chaining mechanism and service prototype implementation in NFV scenarioTrajkovska, Irena / Kourtis, Michail-Alexandros / Sakkas, Christos / Baudinot, Denis / Silva, João / Harsh, Piyush / Xylouris, George / Bohnert, Thomas Michael / Koumaras, Harilaos et al. | 2017
- 266
-
Optimal virtualized network function allocation for an SDN enabled cloudLeivadeas, Aris / Falkner, Matthias / Lambadaris, Ioannis / Kesidis, George et al. | 2017
- 279
-
A user-centric SDN management architecture for NFV-based residential networksFlores Moyano, Ricardo / Fernández Cambronero, David / Bellido Triana, Luis et al. | 2017
- 293
-
Challenges of and solution to the control load of stateful firewall in software defined networksTran, Thuy Vinh / Ahn, Heejune et al. | 2017
- iii
-
Prelim 3 Editorial board| 2017