Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
1] H. Y. Lin and W. G. Tzeng, “A Secure Erasure Code-Based CloudStorage System with Secure Data Forwarding,†IEEE Transactions on Parallel and Cloud Systems, vol. 23, no. 6, pp. 995- 1003, 2012. [2] I. T. Lien, Y. H. Lin, J. R. Shieh, and J. L. Wu, “A Novel Privacy Preserving Location-Based Service Protocol with Secret Circular Shift for K-nn Search,†IEEE Transactions on Data Forensics and Security, [online] ieeexplore. ieee.org/stamp/stamp.jsp?tp=&arnumber=6476 681, 2013. [3] R. S´anchez, F. Almenares, P. Arias, D. D´ıazS´anchez, and A.Mar´ın, “Enhancing Privacy and Dynamic Federation in IdM foR Consumer Cloud Computing,†IEEE Transactions on ConsumerElectronics, vol. 58, no. 1, pp. 95-103, 2012. [4] Y. Tang, P. C. Lee, J. C. S. Lui, and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,†IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, 2012. [5] A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,†IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012. [6] J. Chen, Y. Wang, and X. Wang, “On-Demand Security Architecture for Cloud Computing,†Computer, vol. 45, no. 7, pp. 73- 78,2012 . [7] H. Wang, “Proxy Provable Data Possession in Public Clouds,â€IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnu mber=6357181, 2012. [8] L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,†IEEE Transactions on Data Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013. [9] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,†IEEE Transactions on Parallel and Cloud Systems,vol. 22, no. 5, pp. 847-859, 2011. [10]Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable DataPossession for Integrity Verification in Multi-cloud Storage,†IEEE Transactions on Parallel and Cloud Systems, vol. 23, no, 12, pp. 2231-2244, 2012.
![]() | V2I520.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|