Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] X. Liu, Y. Zhang, B. Wang and J. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Group in the Cloud,†IEEE Tran. On Parallel and Distributed System,vol. 24, no. 6 June 2013. [2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H Katz,A. Konwinski, G. Lee, A.D. Patterson, A. Rabkin, I Stoica, and M. Zaharia, “ A View of Cloud Computing,†comm.ACM, vol. 53, no. 4, pp. 50-58, April 2010 [3] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure Scalable, and Fine-Grained Data Access Control in Cloud Computing,†Proc. IEEE INFOCOM, pp. 534-542, 2010 [4] S. Kamara and K. Lauter, “Cryptographic Cloud Storage,†proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136-149, Jan. 2010 [5] A.M. Lonea, D.E. Popescu, H. Tianfield â€Detecting DDoS Attacks in Cloud Computing Environment†INT J COMPUT COMMUN, ISSN 1841-9836 8(1):70-78, February, 2013. [6] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,†proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003 [7] D. Chaum and E. van Heyst, “Group Signatures,†Proc Int’l Conf.Theory and Applications of Cryptographic Technique (EUROCRYPT),p p. 257-265, 1991. [8] A. Fiat and M. Naor, “Broadcast Encryption,†Proc. Int Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 480-491, 1993 [9] D. Naor, M. Naor, and J.B. Lotspiech, “Revocation and Tracing schemes for Stateless Receivers,†Proc. Ann. Int’l Cryptology (CRYPTO), pp. 41-62, 2001. [10] B. Wang, B. Li, and H. Li, “Knox: PrivacyPreserving Auditing for Shared Data with Large Groups in the Cloud Proc. 10th Int. Conf. Applied Cryptography and Network [11] B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,†proc. Int’l Conf. Pratice and Theory in Public
![]() | V2I11.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|