


default search action
Future Generation Computer Systems, Volume 62
Volume 62, September 2016
- Susmit Bagchi
:
Distributed scheduling with probabilistic and fuzzy classifications of processes. 1-16 - Matthieu Dorier
, Orcun Yildiz, Shadi Ibrahim, Anne-Cécile Orgerie
, Gabriel Antoniu:
On the energy footprint of I/O management in Exascale HPC systems. 17-28 - Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. 29-39 - Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based data analytics across data centers considering bi-level resource provision in cloud computing. 40-50
- Kim-Kwang Raymond Choo
, Josep Domingo-Ferrer
, Lei Zhang:
Cloud Cryptography: Theory, Practice and Future Research Directions. 51-53 - Yongge Wang
, Qutaibah M. Malluhi, Khaled Md. Khan
:
Garbled computation in cloud. 54-65 - Fei Han, Jing Qin
, Jiankun Hu
:
Secure searches in the cloud: A survey. 66-75 - Shuguang Dai, Huige Li, Fangguo Zhang
:
Memory leakage-resilient searchable symmetric encryption. 76-84 - Yong Yu
, Liang Xue, Man Ho Au
, Willy Susilo
, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos
, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. 85-91 - Yu-Chen Hu
, Chun-Chi Lo, Wu-Lin Chen:
Probability-based reversible image authentication scheme for image demosaicking. 92-103 - Giuseppe Ateniese
, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
:
Entangled cloud storage. 104-118 - Sébastien Canard, Julien Devigne:
Highly privacy-protecting data sharing in a tree structure. 119-127 - Yunya Zhou, Hua Deng, Qianhong Wu, Bo Qin, Jianwei Liu, Yong Ding
:
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud. 128-139 - Yang Lu, Jiguo Li:
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. 140-147 - Shi-Yuan Huang, Chun-I Fan
, Yi-Fan Tseng:
Enabled/disabled predicate encryption in clouds. 148-160 - Ximeng Liu
, Rongxing Lu, Jianfeng Ma, Le Chen, Haiyong Bao:
Efficient and privacy-preserving skyline computation framework across domains. 161-174 - Zheng Yan
, Wenxiu Ding
, Valtteri Niemi, Athanasios V. Vasilakos
:
Two Schemes of Privacy-Preserving Trust Evaluation. 175-189 - Xu Yang
, Xinyi Huang, Joseph K. Liu:
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing. 190-195 - Qianhong Wu, Yang Sun, Bo Qin, Jiankun Hu
, Weiran Liu, Jianwei Liu, Yong Ding
:
Batch Public Key Cryptosystem with batch multi-exponentiation. 196-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.