共 50 条
- [1] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme [J]. PLOS ONE, 2023, 18 (02):
- [2] Ensuring Online Data Privacy and Controlling Anonymity [J]. 2015 12TH INTERNATIONAL CONFERENCE & EXPO ON EMERGING TECHNOLOGIES FOR A SMARTER WORLD (CEWIT), 2015,
- [3] Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing [J]. 2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 96 - 100
- [4] Improving the Security by using Various Cryptographic Techniques in Cloud Computing [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 23 - 28
- [5] An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
- [6] Cloud Computing: Preserving Data Privacy and Managing Access Control [J]. INNOVATION VISION 2020: SUSTAINABLE GROWTH, ENTREPRENEURSHIP, AND ECONOMIC DEVELOPMENT, VOLS 1-4, 2012, : 1742 - 1748
- [7] Fine-Grained Access Control ensuring Data Privacy in OpenStack Cloud [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1669 - 1674
- [8] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515
- [9] Cryptographic techniques that combine data protection and ease of utilization in the cloud computing era [J]. Fuji, H., 1600, Nippon Telegraph and Telephone Corp. (10):
- [10] Ensuring Data Integrity in Cloud Computing [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 34 - 38