Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Software
1000-9825
2016 Issue 6
yun ji suan an quan yan jiu zhuan kan qian yan
xue rui ;, ren kui ;, zhang yu qing ;, li zuo ;, liu ji qiang ;, zhao bo ;, zhu lie huang ;
..............page:1325-1327
Survey on Cloud Computing Security
ZHANG Yu-Qing;,WANG Xiao-Fei;,LIU Xue-Feng;,LIU Ling;
..............page:1328-1348
Model Constructing Method for Analyzing the Trusty of Cloud
ZHAO Bo;,DAI Zhong-Hua;,XIANG Shuang;,TAO Wei;
..............page:1349-1365
Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZone
YANG Bo;,FENG Deng-Guo;,QIN Yu;,ZHANG Ying-Jun;
..............page:1366-1383
Research and Application Progress of Virtual Machine Introspection Technology
LI Bao-Hui;,XU Ke-Fu;,ZHANG Peng;,GUO Li;,HU Yue;,FANG Bin-Xing;
..............page:1384-1401
Security Protection Model on Live Migration for KVM Virtualization
FAN Wei;,KONG Bin;,ZHANG Zhu-Jun;,WANG Ting-Ting;,ZHANG Jie;,HUANG Wei-Qing;
..............page:1402-1416
Group Provable Data Possession with Deduplication in Cloud Storage
WANG Hong-Yuan;,ZHU Lie-Huang;,LI Long-Yi-Jia;
..............page:1417-1431
Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding
LEI Lei;,CAI Quan-Wei;,JING Ji-Wu;,LIN Jing-Qiang;,WANG Zhan;,CHEN Bo;
..............page:1432-1450
Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
SHEN Wen-Ting;,YU Jia;,YANG Guang-Yang;,CHENG Xiang-Guo;,HAO Rong;
..............page:1451-1462
Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
XU Jian;,LI Jian;,HAN Jian;,LI Fu-Xiang;,ZHOU Fu-Cai;
..............page:1463-1474
Multi-User Binary Tree Based ORAM Scheme
SUN Xiao-Ni;,JIANG Han;,XU Qiu-Liang;
..............page:1475-1486
Identity-Based Fully Homomorphic Encryption from Eigenvector
KANG Yuan-Ji;,GU Chun-Xiang;,ZHENG Yong-Hui;,GUANG Yan;
..............page:1487-1497
Key-Policy Attribute-Based Encryption Scheme for General Circuits
HU Peng;,GAO Hai-Ying;
..............page:1498-1510
Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model
WEI Fu-Shan;,ZHANG Gang;,MA Jian-Feng;,MA Chuan-Gui;
..............page:1511-1522
ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud Environment
WANG Zhong-Hua;,HAN Zhen;,LIU Ji-Qiang;,ZHANG Da-Wei;,CHANG Liang;
..............page:1523-1537
Trusted Cloud Tenant Separation Mechanism Supporting Transparency
SHI Yong;,GUO Yu;,LIU Ji-Qiang;,HAN Zhen;,MA Wei;,CHANG Liang;
..............page:1538-1548
Secure Set Computing in Cloud Environment
LI Shun-Dong;,ZHOU Su-Fang;,GUO Yi-Min;,DOU Jia-Wei;,WANG Dao-Shun;
..............page:1549-1565
Efficient Ciphertext Search Method Based on Similarity Search Tree
TIAN Xue;,ZHU Xiao-Jie;,SHEN Pei-Song;,CHEN Chi;,ZOU Hong;
..............page:1566-1576
Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records
ZHANG Li-Li;,ZHANG Yu-Qing;,LIU Xue-Feng;,QUAN Han-Yu;
..............page:1577-1591
Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem
XIANG Shi-Jun;,LUO Xin-Rong;
..............page:1592-1601