UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture Journal article
Wu, Haiqin, Düdder, Boris, Wang, Liangmin, Cao, Zhenfu, Zhou, Jun, Feng, Xia. Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture[J]. ACM Computing Surveys, 2024, 56(3), 63.
Authors:  Wu, Haiqin;  Düdder, Boris;  Wang, Liangmin;  Cao, Zhenfu;  Zhou, Jun; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:23.8/21.1 | Submit date:2024/01/10
Outsourced Keyword Search  Searchable Encryption  Cloud Security  Blockchain  Verifiability  
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:  Rezaeibagha, Fatemeh;  Mu, Yi;  Huang, Ke;  Chen, Lanxiang;  Zhang, Leyou
Favorite | TC[WOS]:4 TC[Scopus]:6  IF:5.5/5.9 | Submit date:2024/01/10
Cloud Computing  Data Security  Homomorphic Encryption  Internet Of Things  
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:  Ullah, Fasee;  Pun, Chi Man
Favorite | TC[WOS]:4 TC[Scopus]:4  IF:4.5/4.6 | Submit date:2022/08/05
Auditing  Authenticator  Cloud Computing  Costs  Data Privacy  Dynamics  Error Identification  Organizations  Parity Bits  Privacy  Recovery  Security  Servers  Tag  Time Division Multiplexing  User Revocation.  
Secure Data Query Framework for Cloud and Fog Computing Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:69 TC[Scopus]:68  IF:4.7/4.6 | Submit date:2021/12/06
Cloud Computing  Data Query  Fog Computing  Security  
Fog-based evaluation approach for trustworthy communication in sensor-cloud system Journal article
Wang T., Li Y., Chen Y., Tian H., Cai Y., Jia W., Wang B.. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017, 21(11), 2532-2535.
Authors:  Wang T.;  Li Y.;  Chen Y.;  Tian H.;  Cai Y.; et al.
Favorite | TC[WOS]:18 TC[Scopus]:29 | Submit date:2019/02/11
Least Squares  Multiple Linear Regression  Security  Sensor-cloud System  Trust  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
Yifeng Zheng, Helei Cui, Cong Wang, Jiantao Zhou. Privacy-Preserving Image Denoising from External Cloud Databases[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(6), 1285-1298.
Authors:  Yifeng Zheng;  Helei Cui;  Cong Wang;  Jiantao Zhou
Adobe PDF | Favorite | TC[WOS]:37 TC[Scopus]:42  IF:6.3/7.3 | Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
A Critical Review of Security Threats in Cloud Computing Conference paper
Mahroosh Irfan, Muhammad Usman, Yan Zhuang, Simon Fong. A Critical Review of Security Threats in Cloud Computing[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 105-111.
Authors:  Mahroosh Irfan;  Muhammad Usman;  Yan Zhuang;  Simon Fong
Favorite | TC[WOS]:4 TC[Scopus]:13 | Submit date:2019/02/13
Cloud Computing  Cloud Security  Threats  Service Models  Deployment Models