Architectural Protection of Application Privacy against Software and Physical Attacks in Untrusted Cloud Environment. | 0 | 0.34 | 2018 |
Data verification in information-centric networking with efficient revocable certificateless signature | 0 | 0.34 | 2017 |
Hey, I Know You Are Moving: Producer Movement Status Privacy in Information-Centric Networking | 0 | 0.34 | 2016 |
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data. | 12 | 0.52 | 2015 |
CLKS: Certificateless Keyword Search on Encrypted Data. | 0 | 0.34 | 2015 |
Iot Middleware Architecture Over Information-Centric Network | 5 | 0.46 | 2015 |
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking | 13 | 0.65 | 2015 |
Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment | 4 | 0.39 | 2013 |
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data | 93 | 2.29 | 2013 |
Secure and efficient proof of storage with deduplication | 53 | 1.53 | 2012 |
Multiparty Cloud Computation | 0 | 0.34 | 2012 |
Efficient query integrity for outsourced dynamic databases | 10 | 0.55 | 2012 |
Fair and dynamic proofs of retrievability | 62 | 1.90 | 2011 |
Regular Quasi-cyclic LDPC Codes with Girth 6 from Prime Fields | 1 | 0.36 | 2010 |
Toward optimizing cauchy matrix for cauchy reed-solomon code | 2 | 0.39 | 2009 |