1 |
R. Ada Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with cloudproof. Technical Report MSR-TR-2010-46, Microsoft Research, 2010.
|
2 |
Zhu, S., Yang, X., & Wu, X.. Secure Cloud File System with Attribute Based Encryption. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 99-102). IEEE.
|
3 |
Zwattendorfer, B., & Tauber, A.. Secure cloud authentication using eIDs. In Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on (Vol. 1, pp. 397-401). IEEE.
|
4 |
Stallings, W, "Cryptography and Network Security: Principles and Practices", Prentice Hall, 4th Edition, pp 420-430, 2009.
|
5 |
Hankerson, D, Menezes, A, Vanstone, S, "Guide to elliptic curve cryptography", Springer-Verlag, New York, USA, 2004.
|
6 |
Koblitz, N, "Elliptic Curve Cryptosystem", Journal of mathematics computation, Vol. 48, No. 177, pp203-209, 1987.
DOI
ScienceOn
|
7 |
Miller, V, "Use of elliptic curves in cryptography", Proc. of Advances in Cryptology-CRYPTO' 85, LNCS, Vol. 218, pp. 417-426, 1985.
|
8 |
V.Miller, "Uses of elliptic curves in cryptography", Lecture Notes in Computer Science218: Advances in Cryptology- CRYPTO'85, pages417-426, Springer-Verlag, Berlin, 1986.
|
9 |
N.Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48:203-209, 1987.
DOI
ScienceOn
|
10 |
Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Apr. 2002, http://www.ietf.org/rfc/rfc3278.txt
|
11 |
M. Abdalla, M. Bellare, P. Rogaway, DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem, Contribution to IEEE P1363a, 1998,http://cseweb.ucsd.edu/users/mihir/papers/dhaes.pdf.
|
12 |
M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assmptions and an analysis of DHIES, Lecture Notes in Comput. Sci.2020(2001), 143-158.
|
13 |
Bundesamt fur Sicherheit in der Information stechnik, Elliptic Curve Cryptography, 2009, https://www.bsi.bund.de/cln 183/EN/Home/home node.html.
|
14 |
W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22(1976), 644-654.
DOI
|
15 |
American National Standards Institute, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.
|
16 |
V. Gayoso Martinez, L. Hernandez Encinas, and C. Sanchez Avila, Journal of Computer Science and Engineering, Volum 2, Issue 2, August
|
17 |
Brainpool, ECC Brainpool Standard Curves and Curve Generation, 2005, http://www.ecc-brainpool.org/download/Domain-parameters.pdf.
|
18 |
Arjun Kumar, Byung Gook Lee, HoonJae Lee, Secure Storage and Access of Data in Cloud Computing, ICT Convergence (ICTC), 2012 International Conference on Oct. 15-17, 2012
|
19 |
Institute of Electrical and Electronics Engineers, Standard Specifications for Public Key Cryptography-Amendment 1: Additional Techniques, 2004.
|
20 |
International Organization for Standardization / International Electro technical Commission, Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers, 2006.
|
21 |
N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48(1987), 203-209.
DOI
ScienceOn
|
22 |
V. Gayoso Martinez, L. Hernandez Encinas, C. Sanchez Avila, Security and practical considerations when implementing the Elliptic Curve Integrated Encryption Scheme, preprint, 2010.
|
23 |
V. S. Miller, Use of elliptic curves in cryptography, Lecture Notes in Comput.Sci.218(1986), 417-426.
|
24 |
J. H. Silverman, The Arithmetic of Elliptic Curves, volume 106 of Graduate texts in Mathematics, Springer-Verlag, New York, NY, USA, 1986.
|
25 |
Standards for Efficient Cryptography Group, Recommended Elliptic Curve Domain Parameters, 2000, http://www.secg.org/download/aid-780/sec1-v2.pdf.
|
26 |
Standards for Efficient Cryptography Group, Test Vectors for SEC 1, 1999, http://www.secg.org/download/aid-390/gec2.pdf.
|
27 |
Standards for Efficient Cryptography Group, Elliptic Curve Cryptography, 2000, http://www.secg.org/download/aid-86/sec2 final.pdf.
|
28 |
Hee Won Myeong, Jung Ha Paik, Dong Hoon Lee, "Study on implementation of Secure HTML5 Local Storage," Journal of Korean Society for Internet Information, Vol. 13, No. 4, pp.83-93, Aug. 2012.
과학기술학회마을
DOI
|
29 |
Yunho Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, Vol.14, No.5, pp.15-21, June 2013.
과학기술학회마을
DOI
ScienceOn
|
30 |
Young Bae Yoon, Junseok Oh, Bong Gyou Lee, "The Important Factors in Security for Introducing the Cloud Services," Journal of Korean Society for Internet Information, Vol. 13, No. 6, pp.33-40, Dec. 2012.
과학기술학회마을
DOI
ScienceOn
|
31 |
National Institute of Standards and Technology, Digital Signature Standard (DSS), 2000.
|
32 |
Liu, Q., Wang, G., & Wu, J.. Efficient sharing of secure cloud storage services. In Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on (pp. 922-929). IEEE.
|