Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] V. Saiharitha, S. J. Saritha, “A privacy and dynamic multi-keyword ranked search scheme over cloud data encrypted†,†IEICE Trans. Commun., pp. 190–200, 2016. [2] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual verifiable provable data auditing in public cloud storage,†J. Internet Technol., vol. 16, no. 2, pp. 317–323, 2015. [3] M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,†in Proc. CCS, 1996, pp. 48– 57. [4] E.-J. Yoon, Y. Choi, and C. Kim, “New ID-based proxy signature scheme with message recovery,†in Grid and Pervasive Computing (Lecture Notes in Computer Science), vol. 7861. Berlin, Germany: SpringerVerlag, 2013, pp. 945– 951. [5] B.-C. Chen and H.-T.Yeh, “Secure proxy signature schemes from the weil pairing,†J. Supercomput., vol. 65, no. 2, pp. 496–506, 2013. [6] X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li, “Personal health records integrity verification using attribute based proxy signature in cloud computing,†in Internet and Distributed Computing Systems (Lecture Notes in Computer Science), vol. 8223. Berlin, Germany: SpringerVerlag, 2013, pp. 238– 251. [7] H. Guo, Z. Zhang, and J. Zhang, “Proxy re-encryption with unforgeable re-encryption keys,†in Cryptology and Network Security (Lecture Notes in Computer Science), vol. 8813. Berlin, Germany: Springer-Verlag, 2014, pp. 20–33. [8] E. Kirshanova, “Proxy re-encryption from lattices,†in Public-Key Cryptography (Lecture Notes in Computer Science), vol. 8383. Berlin, Germany: Springer-Verlag, 2014, pp. 77–94. [9] P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage,†Chin. Sci. Bull., vol. 59, no. 32, pp. 4201–4209, 2014. [10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka, and K. Matsuura, “Re-encryption verifiability: How to detect malicious activities of a proxy in proxy re-encryption,†in Proc. CT-RSA Conf., vol. 9048. 2015, pp. 410–428. [11] G. Ateniese et al., “Provable data possession at untrusted stores,†in Proc. CCS, 2007, pp. 598–609. [12] G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,†in Proc. SecureComm, 2008, Art. ID 9. [13] C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,†in Proc. CCS, 2009, pp. 213–222. [14] E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis and optimization on FlexDPDP: A practical solution for dynamic provable data possession,†Intelligent Cloud Computing (Lecture Notes in Computer Science), vol. 8993. Berlin, Germany: Springer-Verlag, 2014, pp. 65–83. [15] E. Zhou and Z. Li, “An improved remote data possession checking protocol in cloud storage,†in Algorithms and Architectures for Parallel Processing (Lecture Notes in Computer Science), vol. 8631. Berlin, Germany: SpringerVerlag, 2014, pp. 611–617. [16] H. Wang, “Proxy provable data possession in public clouds,†IEEE Trans. Services Comput., vol. 6, no. 4, pp. 551– 559, Oct./Dec. 2013. [17] H. Wang, “Identity-based distributed provable data possession in multicloud storage,†IEEE Trans. Services Comput., vol. 8, no. 2, pp. 328–340, Mar./Apr. 2015. [18] H. Wang, Q. Wu, B. Qin, and J. Domingo-Ferrer, “FRR: Fair remote retrieval of outsourced private medical records in electronic health networks,†J. Biomed. Inform., vol. 50, pp. 226–233, Aug. 2014. [19] H. Wang, “Anonymous multi-receiver remote data retrieval for pay-TV in public clouds,†IET Inf. Secur., vol. 9, no. 2, pp. 108–118, Mar. 2015. [20] H. Shacham and B. Waters, “Compact proofs of retrievability,†in Proc. ASIACRYPT, vol. 5350.2008, pp. 90– 107. [21] Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability,†in Proc. CODASPY, 2011, pp. 237–248. [22] D. Cash, A. Küpçü, and D. Wichs, “Dynamic proofs of retrievability via oblivious RAM,†in Proc. EUROCRYPT, vol. 7881. 2013, pp. 279–295. [23] J. Zhang, W. Tang, and J. Mao, “Efficient public verification proof of retrievability scheme in cloud,†Cluster Comput., vol. 17, no. 4, pp. 1401–1411, 2014. [24] J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, “A novel routing protocol providing good transmission reliability in underwater sensor networks,†J. Internet Technol., vol. 16, no. 1, pp. 171–178, 2015. [25] T. Ma et al., “Social network and tag sources based augmenting collaborative recommender system,†IEICE Trans. Inf. Syst., vol. E98-D, no. 4, pp. 902–910, 2015. //crypto.stanford.edu/pbc/thesis.pdf [26] P.FARZANA, A.HARSHAVARDHAN,â€Integrity Auditing for Outsourced DynamicCloud Data with Group User Revocation.â€International Journal of Computer Engineering in Research Trends., vol.2, no.11, pp. 877-881, 2015. [27] N. Meghasree,U.Veeresh and Dr.S.Prem Kumar,â€Multi Cloud Architecture to Provide DataPrivacy and Integrity.â€International Journal of Computer Engineering in Research Trends., vol.2, no.9, pp. 558-564, 2015. [28] A.Shekinahpremasunaina,â€Decentralized Fine-grained Access Controlscheme for Secure Cloud Storage data.â€International Journal of Computer Engineering in Research Trends., vol.2, no.7, pp. 421-424, 2015. [29] P. Rizwanakhatoon andDr.C.MohammedGulzar ,â€SecCloudPro:A Novel Secure CloudStorage System for Auditing andDeduplication.â€International Journal of Computer Engineering in Research Trends., vol.3, no.5, pp. 210-215, 2016. [30] B.Sameena Begum, P.RaghaVardhini,â€Augmented Privacy-Preserving AuthenticationProtocol by Trusted Third Party in Cloud.â€International Journal of Computer Engineering in Research Trends., vol.2, no.5, pp. 378-382, 2015.
![]() | V4I1004.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|