欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Secure and Efficient Data-Sharing in Clouds
所属机构名称:中国科学院软件研究所
会议名称:International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2013)
时间:2013.9
成果类型:会议
相关项目:可信计算环境测评理论和技术研究
同会议论文项目
可信计算环境测评理论和技术研究
期刊论文 56
会议论文 49
著作 1
同项目会议论文
Improving the security of the HMQV protocol using tamper-proof hardware
Universally Composable secure TNC
Authenticated key exchange from ideal lattices
3kf9: enhancing 3GPP-MAC beyond the birthday bound
Ciphertext Policy Attribute-Based Encryption from Lattices
Formal Analysis of Enhanced Authorization in the TPM 2.0
TSD: A Flexible Root of Trust for the Cloud
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order six over $Z_{pq}$
Towards a Secure Certificateless Proxy Re-encryption Scheme,Towards a Secure Certificateless Proxy R
Fully Secure Doubly-Spatial Encryption under Simple Assumptions
Combined Public-Key Schemes: The Case of ABE and ABS
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking
Type-Based Analysis of Protected Storage in the TPM
TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications
Mobile Trusted Agent(MTA):Build user-based trust for general-purpose computer platform
On the Security of an Efficient Attribute-Based Signature
KP-ABE Based Verifiable Cloud Access Control Scheme
Proxy re-encryption with unforgeable re-encryption keys
Authenticated Key Exchange with Entities from Different Settings and Varied Groups
DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography
Integral Based Fault Analysis on LBlock
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Padding Oracle Attack on PKCS#1 v1.5: Can non-standard implementation act as a shelter
A general method to evaluate the correlation of randomness tests
A New Efficient Property-based Attestation Protocol Based on Elliptic Curves
TSD: A Flexible Root of Trust for the Cloud
Combined public-key schemes: The case of ABE and ABS
Fully secure doubly-spatial encryption under simple assumptions
An Attribute Based Encryption Scheme with Fine-Grained Attribute Revocation
TrustToken: a Generic Security Framework for Mobile Two-factor Authentication Using TrustZone
Security Analysis of EMV Channel Establishment Protocol in an Enhanced Security Model
Black-box Separation for One-more (Static) CDH and Its Generation
ExBLACR: Extending BLACR System
DAA-Related APIs in TPM 2.0 Revisited
Direct Anonymous Attestation in practice: Implementation and efficient revocation
Formal Analysis of DAA-Related APIs in TPM 2.0
Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices
Automated Proof for Authorization Protocols of TPM 2.0 in computational model
Providing Root of Trust for ARM TrustZone using On-Chip SRAM
A Lightweight Anonymous M-shopping Scheme Based on DAA for Trusted Mobile Platform
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs
Ciphertext Policy Attribute-Based Encryption from Lattices
. A New Efficient Property-based Attestation Protocol Based on Elliptic Curves
Formal analysis of ECC-based Direct Anonymous Attestation schemes in Applied Pi Calculus
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structur
Certificateless Proxy Re-Encryption without Pairings