Journal articles on the topic 'Anonymous cloud'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Anonymous cloud.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fan, Yi Jie, Zhen Qiao, and Ming Zhong Xiao. "One Cloud: A Secure and Anonymous Multi-Cloud Oblivious Storage Architecture." Applied Mechanics and Materials 556-562 (May 2014): 5591–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5591.
Full textZHANG, Yan, Deng-Guo FENG, and Ai-Min YU. "Virtual Machine Anonymous Attestation in Cloud Computing." Journal of Software 24, no. 12 (January 17, 2014): 2897–908. http://dx.doi.org/10.3724/sp.j.1001.2013.04389.
Full textUsha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (June 30, 2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.
Full textNing, Zhen-Hu, Wei Jiang, Jing Zhan, and Peng Liang. "Property-Based Anonymous Attestation in Trusted Cloud Computing." Journal of Electrical and Computer Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/687158.
Full textKonan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.
Full textDongjun Luo. "Efficient Certificateless Anonymous Attestation to Trusted Cloud Computing Platforms." International Journal of Advancements in Computing Technology 4, no. 17 (September 30, 2012): 28–37. http://dx.doi.org/10.4156/ijact.vol4.issue17.4.
Full textB. Amane, Pravin B. More, Yogesh. "Confidential Data Sharing in Cloud using Anonymous Assignment Key." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 950–56. http://dx.doi.org/10.15680/ijircce.2015.0302035.
Full textMorimoto, Yasuhiko, Mohammad Shamsul Arefin, and Mohammad Anisuzzaman Siddique. "Agent-based anonymous skyline set computation in cloud databases." International Journal of Computational Science and Engineering 7, no. 1 (2012): 73. http://dx.doi.org/10.1504/ijcse.2012.046182.
Full textMehmood, Abid, Iynkaran Natgunanathan, Yong Xiang, Howard Poston, and Yushu Zhang. "Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications." IEEE Access 6 (2018): 33552–67. http://dx.doi.org/10.1109/access.2018.2841972.
Full textShen, Jian, Tianqi Zhou, Xiaofeng Chen, Jin Li, and Willy Susilo. "Anonymous and Traceable Group Data Sharing in Cloud Computing." IEEE Transactions on Information Forensics and Security 13, no. 4 (April 2018): 912–25. http://dx.doi.org/10.1109/tifs.2017.2774439.
Full textLiu, Zhusong, Hongyang Yan, and Zhike Li. "Server-aided anonymous attribute-based authentication in cloud computing." Future Generation Computer Systems 52 (November 2015): 61–66. http://dx.doi.org/10.1016/j.future.2014.12.001.
Full textLi, Wenmin, Shuo Zhang, Qi Su, Qiaoyan Wen, and Yang Chen. "An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems." Wireless Communications and Mobile Computing 2018 (September 2, 2018): 1–12. http://dx.doi.org/10.1155/2018/8131367.
Full textKuo, Yu-Jie (Jessica), and Jiann-Cherng Shieh. "iPatient Privacy Copyright Cloud Management." Applied Sciences 10, no. 5 (March 9, 2020): 1863. http://dx.doi.org/10.3390/app10051863.
Full textLee, Hakjun, Dongwoo Kang, Youngsook Lee, and Dongho Won. "Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment." Wireless Communications and Mobile Computing 2021 (July 27, 2021): 1–20. http://dx.doi.org/10.1155/2021/2098530.
Full textLi, Fengyin, Can Cui, Dongfeng Wang, Zhongxing Liu, Nebrase Elmrabit, Ying Wang, and Huiyu Zhou. "Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing." IEEE Access 8 (2020): 62660–69. http://dx.doi.org/10.1109/access.2020.2982961.
Full textS., Shital. "Decentralized Anonymous User Authentication For Securing Data Storage in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 05–10. http://dx.doi.org/10.17762/ijritcc2321-8169.150102.
Full textYuen, Tsz Hon, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, and Jianying Zhou. "$k$ -Times Attribute-Based Anonymous Access Control for Cloud Computing." IEEE Transactions on Computers 64, no. 9 (September 1, 2015): 2595–608. http://dx.doi.org/10.1109/tc.2014.2366741.
Full textYao, Yingying, Xiaolin Chang, Lin Li, and Runkai Yang. "CLAM: lightweight certificateless anonymous authentication mechanism for vehicular cloud services." Cyber-Physical Systems 4, no. 1 (January 2, 2018): 17–38. http://dx.doi.org/10.1080/23335777.2018.1431960.
Full textDeebak, B. D., Fadi Al-Turjman, and Leonardo Mostarda. "Seamless secure anonymous authentication for cloud-based mobile edge computing." Computers & Electrical Engineering 87 (October 2020): 106782. http://dx.doi.org/10.1016/j.compeleceng.2020.106782.
Full textWang, Anxi, Jian Shen, Chen Wang, Huijie Yang, and Dengzhi Liu. "Anonymous data collection scheme for cloud-aided mobile edge networks." Digital Communications and Networks 6, no. 2 (May 2020): 223–28. http://dx.doi.org/10.1016/j.dcan.2019.04.001.
Full textNasiraee, Hassan, and Maede Ashouri-Talouki. "Anonymous decentralized attribute-based access control for cloud-assisted IoT." Future Generation Computer Systems 110 (September 2020): 45–56. http://dx.doi.org/10.1016/j.future.2020.04.011.
Full textXu, Meijia, Ding Wang, Qingxuan Wang, and Qiaowen Jia. "Understanding security failures of anonymous authentication schemes for cloud environments." Journal of Systems Architecture 118 (September 2021): 102206. http://dx.doi.org/10.1016/j.sysarc.2021.102206.
Full textGomaa, Ibrahim A., and Emad Abd-Elrahman. "A Novel Virtual Identity Implementation for Anonymous Communication in Cloud Environments." Procedia Computer Science 63 (2015): 32–39. http://dx.doi.org/10.1016/j.procs.2015.08.309.
Full textArdagna, Claudio A., Mauro Conti, Mario Leone, and Julinda Stefa. "An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments." IEEE Transactions on Services Computing 7, no. 3 (July 2014): 373–86. http://dx.doi.org/10.1109/tsc.2014.2304717.
Full textMaharajanavar, Swetha. "Anonymous Authentication of Decentralized Access Control of Data Stored in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 2194–97. http://dx.doi.org/10.17762/ijritcc2321-8169.150493.
Full textZhang, Yinghui, Chen Chen, Dong Zheng, Rui Guo, and Shengmin Xu. "Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage." IEEE Access 7 (2019): 113832–43. http://dx.doi.org/10.1109/access.2019.2935180.
Full text., Linawati, I. Gede Totok Suryawan, and Made Sudarma. "Anonymous Authentication with Centralize Access Control of Data Storage in Cloud." International Journal of Security and Its Applications 11, no. 1 (January 31, 2017): 179–92. http://dx.doi.org/10.14257/ijsia.2017.11.1.15.
Full textChaudhry, Shehzad Ashraf, I. Luk Kim, Seungmin Rho, Mohammad Sabzinejad Farash, and Taeshik Shon. "An improved anonymous authentication scheme for distributed mobile cloud computing services." Cluster Computing 22, S1 (August 21, 2017): 1595–609. http://dx.doi.org/10.1007/s10586-017-1088-9.
Full textWang, Huaqun, Zhiwei Wang, and Josep Domingo-Ferrer. "Anonymous and secure aggregation scheme in fog-based public cloud computing." Future Generation Computer Systems 78 (January 2018): 712–19. http://dx.doi.org/10.1016/j.future.2017.02.032.
Full textWu, Songyang, and Yong Zhang. "Secure cloud storage using anonymous and blackbox traceable data access control." Security and Communication Networks 8, no. 18 (September 11, 2015): 4308–18. http://dx.doi.org/10.1002/sec.1343.
Full textYang, Bo Long, and Hao Guo. "Remote Attestation on Trusted Cloud Computing." Applied Mechanics and Materials 696 (November 2014): 161–66. http://dx.doi.org/10.4028/www.scientific.net/amm.696.161.
Full textSong, Lingwei, Dawei Zhao, Xuebing Chen, Chenlei Cao, and Xinxin Niu. "A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud." Mathematical Problems in Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/614375.
Full textMo, Jiaqing, Zhongwang Hu, Hang Chen, and Wei Shen. "An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing." Wireless Communications and Mobile Computing 2019 (February 4, 2019): 1–12. http://dx.doi.org/10.1155/2019/4520685.
Full textMaguin, Jean-Marie. "The Cloud of Unknowing : An Examination." Moreana 46 (Number 177-, no. 2-3 (December 2009): 9–24. http://dx.doi.org/10.3366/more.2009.46.2-3.3.
Full textMurthy, Sowmiya. "CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY." ICTACT Journal on Soft Computing 05, no. 01 (October 1, 2014): 844–49. http://dx.doi.org/10.21917/ijsc.2014.0120.
Full textLin, Han-Yu. "Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments." IEEE Systems Journal 13, no. 2 (June 2019): 1608–17. http://dx.doi.org/10.1109/jsyst.2018.2828022.
Full textLi, Jin, Xiaofeng Chen, and Xinyi Huang. "New attribute-based authentication and its application in anonymous cloud access service." International Journal of Web and Grid Services 11, no. 1 (2015): 125. http://dx.doi.org/10.1504/ijwgs.2015.067161.
Full textMurugan, R., Rene V. V. Sundar, B. Ravinder Choudry, Mrs Sudha, and Mrs Aruna. "Cloud Based Vehicle Parking System for Anonymous Place Using Internet of Things." International Journal of Advanced Engineering Research and Science 4, no. 2 (2017): 66–68. http://dx.doi.org/10.22161/ijaers.4.2.13.
Full textZha, Xin. "Research on a New Attribute Encryption Anonymous Algorithm in Cloud Computing Environment." Journal of Physics: Conference Series 1673 (November 2020): 012059. http://dx.doi.org/10.1088/1742-6596/1673/1/012059.
Full textZhang, Yinghui, Jin Li, Xiaofeng Chen, and Hui Li. "Anonymous attribute-based proxy re-encryption for access control in cloud computing." Security and Communication Networks 9, no. 14 (July 7, 2016): 2397–411. http://dx.doi.org/10.1002/sec.1509.
Full textLin, Xi-Jun, Lin Sun, and Haipeng Qu. "Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing." IEEE Transactions on Information Forensics and Security 16 (2021): 2773–75. http://dx.doi.org/10.1109/tifs.2021.3065505.
Full textYao, Shuang, and Dawei Zhang. "Anonymous Certificate-Based Inner Product Broadcast Encryption." Security and Communication Networks 2021 (August 30, 2021): 1–17. http://dx.doi.org/10.1155/2021/6639835.
Full textSudheer, P., and T. Lakshmi Surekha. "Control Cloud Data Access Privilge Anonymity with Attributed Based Encryption." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 279. http://dx.doi.org/10.23956/ijarcsse.v7i8.68.
Full textShen, Jian, Jun Shen, Chin-Feng Lai, Qi Liu, and Tianqi Zhou. "Cloud Based Data Protection in Anonymously Controlled SDN." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9845426.
Full textWei, Fushan, Ruijie Zhang, and Chuangui Ma. "A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing." Fundamenta Informaticae 157, no. 1-2 (January 24, 2018): 201–20. http://dx.doi.org/10.3233/fi-2018-1626.
Full textMeddah, Naîma, and Ahmed Toumanari. "Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption." International Journal of Cloud Computing 5, no. 3 (2016): 187. http://dx.doi.org/10.1504/ijcc.2016.080044.
Full textMeddah, Naîma, and Ahmed Toumanari. "Reinforce cloud computing access control with key policy attribute-based anonymous proxy reencryption." International Journal of Cloud Computing 5, no. 3 (2016): 187. http://dx.doi.org/10.1504/ijcc.2016.10000905.
Full textJung, Taeho, Xiang-Yang Li, Zhiguo Wan, and Meng Wan. "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption." IEEE Transactions on Information Forensics and Security 10, no. 1 (January 2015): 190–99. http://dx.doi.org/10.1109/tifs.2014.2368352.
Full textGope, Prosanta, and Ashok Kumar Das. "Robust Anonymous Mutual Authentication Scheme for n-Times Ubiquitous Mobile Cloud Computing Services." IEEE Internet of Things Journal 4, no. 5 (October 2017): 1764–72. http://dx.doi.org/10.1109/jiot.2017.2723915.
Full textFish, Adam. "FCJ-191 Mirroring the Videos of Anonymous: Cloud Activism, Living Networks, and Political Mimesis." Fibreculture Journal, no. 26 (December 22, 2015): 85–107. http://dx.doi.org/10.15307/fcj.26.191.2015.
Full text