1 |
D. Zissis, D. Lekkas, "Addressing cloud computing security issues, Future Generation Computer Systems", pp.583-592, 2012.
|
2 |
Shamir, A, "Identity-based cryptosystems and signature schemes", CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg ,1985.
|
3 |
D. Huang, Z. Zhou, L. Xu, T. Xing and Y. Zhong, "Secure Data Processing Framework for Mobile Cloud Computing", IEEE INFOCOM 2011 Workshop on Cloud Computing, IEEE, pp. 620-624, 2011.
|
4 |
Gentry, C., Silverberg, A. "Hierarchical ID-Based cryptography." ASIACRYPT 2002. LNCS, vol. 2501, pp. 548-566. Springer, Heidelberg, 2002.
|
5 |
Horwitz, J., Lynn, B. "Toward Hierarchical Identity-Based Encryption." EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg, 2002.
|
6 |
N. Kaaniche, A. Boundguiga. "ID-Based Cryptographty for Secure Cloud Data Storage" Communicating System Laboratory Saclay, 91400, France, 2012.
|
7 |
S .K.Parsha, M .K.Pasha, "Enhancing Data Access Security in Cloud Computing using Hierarchical Identity Based Encryption(HIBE)", International journal of scientific & engineering research volume3, issue5, May 2012.
|
8 |
J. Susilo, Y.Mu, "Identity-based data storage in cloud computing", Faculty of Engineering and Information Sciences, 2012.
|
9 |
C. Schridde, T. Dornemann, E. Juhnke, B. Freisleben, M. Smith, "An Identity-Based Security Infrastructure for Cloud Environments," 2010 IEEE International Conference on Wireless Communications, Networking and Infor- mation Security, pp. 644 - 649, 2010.
|