Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1]. Mohamed Nabeel, Elisa Bertino, Seung-Hyun Seo, Xiaoyu‖ Ding‖ Members‖ of‖ IEEE‖ ‚An‖ Efficient‖ Certificate-less Encryption for Secure Data Sharing in Public‖Clouds‛‖June‖2013.‖ [2]. Zhiguo Wan, Jun‟ e Liu and Robert H. Deng. Senior‖ Member,‖ IEEE‖ ‚HASBE:‖ A‖ Hierarchical‖ Attribute-Based Solution for Flexible and Scalable Access‖Control‖in‖Cloud‖Computing‛‖April‖2012.‖ [3]. Mohamed Nabeel, Student Member, IEEE, Ning Shang, Elisa Bertino‖Fellow,‖ IEEE‖‚Privacy‖Preserving‖ Policy‖Based‖Content‖Sharing‖in‖Public‖Clouds‛‖2013.‖ [4]. Mohamed Nabeel, Elisa Bertino Fellow, IEEE ‚Privacy‖ Preserving‖ Delegated‖ Access‖ Control‖ in‖ Public‖Clouds‛‖2013.‖ [5]. Yang Tang, Patrick P.C. Lee, Member, IEEE, John C.S. Lui, Fellow, IEEE, and Radia Perlman, Fellow, IEEE‖ ‚Secure‖ Overlay‖ Cloud‖ Storage‖ With‖ Access‖ Control‖ and‖ Assured‖ Deletion‛‖ November/December‖ 2012. [6]. Sushmita Ruj, CSE, Indian Institute of Technology, Indore, India, Milos Stojmenovic, Singidunum University, Belgrade, Serbia, Amiya Nayak, SEECS, University‖ of‖ Ottawa,‖ Canada,‖ ‚Decentralized‖ Access‖ Control with Anonymous Authentication of Data Stored‖in‖Clouds‛‖2013.‖ [7]. Smitha Sundareswaran, Anna C. Squicciarini, Member,‖ IEEE,‖ and‖ Dan‖ Lin,‖ ‚Ensuring Distributed Accountability‖ for‖ Data‖ Sharing‖in‖ the‖ Cloud‛‖March‖ 2012. [8]. Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian‖ Weng‖ ‚Attribute- Based Encryption with Verifiable‖Outsourced‖Decryption‛‖2013. [9] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi‖ ―Data‖ Security‖ in‖ Cloud‖ Computing‖ with‖ Elliptic‖Curve‖Cryptography‖‖ International‖ Journal‖of‖ Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-3, July 2012. [11] N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203–209,1987. [10] V. Miller. Use of elliptic curves in cryptography. Advances in Cryptology—CRYPTO‖ ‘85‖ (LNCS‖ 218)‖ [483], 417– 426, 1986.
![]() | V1I51.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|