Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
1. Kui Ren, Cong Wang, and Qian Wang, “Security Challenges for the Public Cloudâ€, Internet Computing, IEEE, Vol. 16, Issue 1,Jan.-Feb. 2012. 2. Y. Lu and G. Tsudik, “Privacy-Preserving Cloud Database Queryingâ€, Journal of Internet Services and Information Security (JISIS), Vol. 1, No. 4, November 2011. 3. Siani Pearson, Yun Shen, Miranda Mowbray, “A Privacy Manager for Cloud Computingâ€, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings 4. Jian Wang, Yan Zhao, Shuo Jiang, Jiajin Le, “Providing privacy preserving in cloud computingâ€, Test and Measurement, vol. 2, ICTM '09, International Conference, 2009. 5. Miao Zhou , Yi Mu , Willy Susilo , Jun Yan , Liju Dong, “Privacy enhanced data outsourcing in the cloud, Journal of Network and Computer Applicationsâ€, vol. 35, issue 4, pp. 1367–1373, 2012. 6. Qin Liu, Guojun Wang, Jie Wu, “Secure and privacy preserving keyword searching for cloud storage servicesâ€, Journal of Network and Computer Applications, vol. 35, pp. 927–933, 2012. 7. Haibo Hu, Jianliang Xu , Chushi Ren , Byron Choi, “Processing private queries over untrusted data cloud through privacy homomorphism†, Data Engineering (ICDE), 2011. 8. Marten Van Dijk, Ari Juels, “On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computingâ€, IACR Cryptology eprint Archive, 2010. 9. Dr. Alexander Benlian, Prof. Dr. Thomas Hess, Prof. Dr. Peter Buxmann, “Drivers of SaaS-Adoption – An Empirical Study of Different Application Typeâ€, Business & Information Systems Engineering, Vol. 1, Issue 5, pp 357-369, October 2009. 10. Shucheng Yu Cong Wang, Kui Ren , Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computingâ€, INFOCOM, 2010 Proceedings IEEE. 11. Vipul Goyal,Omkant Pandey, Amit Sahai, Brent Waters , “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Dataâ€, Proceeding CCS '06 Proceedings of the 13th ACM conference on Computer and communications security Pages 89 - 98 ,ACM New York, NY 12. John Bethencourt, Amit Sahai, Brent Waters, “Ciphertext-Policy Attribute-Based Encryption, Security and Privacyâ€, 2007. 13. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryptionof ABE ciphertexts,†in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011. 14. Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryptionâ€, IEEE Transaction on Information Forensics and Security, vol. 8, no. 8, August 2013
![]() | V1I52.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|