共 50 条
- [1] A Comprehensive Evaluation of Cryptographic Algorithms in Cloud Computing 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 32 - 36
- [4] Securing Cryptographic Keys in the IaaS Cloud Model 2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
- [6] Key derivation algorithms for monotone access structures in cryptographic file systems COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 347 - +
- [7] Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 447 - 454
- [8] Survey on the Key Management for securing the Cloud BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 115 - 121
- [9] Securing Visual Cryptographic Shares using Public Key Encryption PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1108 - 1113
- [10] ID-BASED PUBLIC KEY CRYPTOGRAPHIC SYSTEMS PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2023, (61): : 44 - 85