Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Baojiang Cui, Zheli Liu and Lingyu Wang : Key-Aggregate Searchable Encryption for Group Data Sharing via Cloud Storage, IEEE Transactions On Computers, Vol. 6, No. 1, January 2014 [2] R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computingâ€, Proc. ACM Symp. Information, Computer and Comm.Security, pp. 282-292, 2010. [3] X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure multiowner data sharing for dynamic groups in the cloudâ€, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182- 1191. [4] C. Chu, S. Chow,W. Tzeng, et al. “KeyAggregate Cryptosystem for Scalable Data Sharing in Cloud Storageâ€, IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468-477. [5] X. Song, D.Wagner, A. Perrig. “Practical techniques for searches on encrypted dataâ€, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000. [6] R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. “Searchable symmetric encryption: improved definitions and efficient constructionsâ€, In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79-88, 2006. [7] P. Van,S. Sedghi, JM. Doumen. “Computationally efficient searchable symmetric encryptionâ€, Secure Data Management, pp.87-100, 2010. [8] S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric encryptionâ€, Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965- 976, 2012. [9] D. Boneh, C. G, R. Ostrovsky, G. Persiano. “Public Key Encryption with Keyword Searchâ€, EUROCRYPT 2004, pp. 506C522,2004. [10] Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user Systemâ€, In: PairingBased Cryptography C Pairing 2007, LNCS, pp. 2- 22, 2007. [11] J. Li, Q. Wang, C. Wang. “Fuzzy keyword search over encrypted data in cloud computingâ€, Proc. IEEE INFOCOM, pp. 1-5, 2010. [12] C. Bosch, R. Brinkma, P. Hartel. “Conjunctive wildcard search over encrypted dataâ€, Secure Data Management. LNCS, pp. 114- 127, 2011. [13] C. Dong, G. Russello, N. Dulay. “Shared and searchable encrypted data for untrusted serversâ€, Journal of Computer Security, pp. 367-397, 2011. [14] F. Zhao, T. Nishide, K. Sakurai. Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. Information Security and Cryptology, LNCS, pp. 406-418, 2012. [15] J. W. Li, J. Li, X. F. Chen, et al. “Efficient Keyword Search over Encrypted Data with FineGrained Access Control in Hybrid Cloudâ€, In: Network and System Security 2012, LNCS, pp. 490- 502, 2012. [16] J. Li, K. Kim. “Hidden attribute-based signatures without anonymity revocationâ€, Information Sciences, 180(9): 1681-1689, Elsevier, 2010. [17] X.F. Chen, J. Li, X.Y. Huang, J.W. Li, Y. Xiang. “Secure Outsourced Attribute-based Signaturesâ€, IEEE Trans. on Parallel and Distributed Systems, DOI.ieeecomputersociety.org/10.1109/TPDS.2013.1 80, 2013. [18] J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. “Secure Deduplication with Efficient and Reliable Convergent Key Managementâ€, IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014. [19] Z. Liu, Z. Wang, X. Cheng, et al. “Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloudâ€, Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013. [20] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computingâ€, Proc. IEEE INFOCOM, pp. 525-533, 2010. [21] B. Wang, B. Li, and H. Li, “Knox: PrivacyPreserving Auditing for Shared Data with Large Groups in the Cloudâ€, Proc. 10th Int’l Conf. Applied Cryptography and Network Security, pp. 507- 525, 2012. [22] D. Boneh, C. Gentry, B. Waters.“ Collusion resistant broadcast encryption with short ciphertexts and private keysâ€, Advances in CryptologyCCRYPTO 2005, pp. 258-275, 2005. [23] D. H. Phan, D. Pointcheval, S. F. Shahandashti, et al. “Adaptive CCA broadcast encryption with constant-size secret keys and ciphertextsâ€, International journal of information security, 12(4):251-265, 2013. [24] D. Boneh, B. Lynn, H. Shacham. “Short signatures from the Weil pairingâ€, Advances in Cryptology ASIACRYPT 2001, pp. 514-532, 2001.
![]() | V2I1132.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|