References
- Zhu, S., Yang, X., & Wu, X.. Secure Cloud File System with Attribute Based Encryption. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 99-102). IEEE.
- Zwattendorfer, B., & Tauber, A.. Secure cloud authentication using eIDs. In Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on (Vol. 1, pp. 397-401). IEEE.
- Liu, Q., Wang, G., & Wu, J.. Efficient sharing of secure cloud storage services. In Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on (pp. 922-929). IEEE.
- R. Ada Popa, J. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. Enabling security in cloud storage SLAs with cloudproof. Technical Report MSR-TR-2010-46, Microsoft Research, 2010.
- Stallings, W, "Cryptography and Network Security: Principles and Practices", Prentice Hall, 4th Edition, pp 420-430, 2009.
- Hankerson, D, Menezes, A, Vanstone, S, "Guide to elliptic curve cryptography", Springer-Verlag, New York, USA, 2004.
- Koblitz, N, "Elliptic Curve Cryptosystem", Journal of mathematics computation, Vol. 48, No. 177, pp203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Miller, V, "Use of elliptic curves in cryptography", Proc. of Advances in Cryptology-CRYPTO' 85, LNCS, Vol. 218, pp. 417-426, 1985.
- V.Miller, "Uses of elliptic curves in cryptography", Lecture Notes in Computer Science218: Advances in Cryptology- CRYPTO'85, pages417-426, Springer-Verlag, Berlin, 1986.
- N.Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, 48:203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Apr. 2002, http://www.ietf.org/rfc/rfc3278.txt
- M. Abdalla, M. Bellare, P. Rogaway, DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem, Contribution to IEEE P1363a, 1998,http://cseweb.ucsd.edu/users/mihir/papers/dhaes.pdf.
- M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assmptions and an analysis of DHIES, Lecture Notes in Comput. Sci.2020(2001), 143-158.
- American National Standards Institute, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1998.
- V. Gayoso Martinez, L. Hernandez Encinas, and C. Sanchez Avila, Journal of Computer Science and Engineering, Volum 2, Issue 2, August
- Brainpool, ECC Brainpool Standard Curves and Curve Generation, 2005, http://www.ecc-brainpool.org/download/Domain-parameters.pdf.
- Bundesamt fur Sicherheit in der Information stechnik, Elliptic Curve Cryptography, 2009, https://www.bsi.bund.de/cln 183/EN/Home/home node.html.
- W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory 22(1976), 644-654. https://doi.org/10.1109/TIT.1976.1055638
- Arjun Kumar, Byung Gook Lee, HoonJae Lee, Secure Storage and Access of Data in Cloud Computing, ICT Convergence (ICTC), 2012 International Conference on Oct. 15-17, 2012
- Institute of Electrical and Electronics Engineers, Standard Specifications for Public Key Cryptography-Amendment 1: Additional Techniques, 2004.
- International Organization for Standardization / International Electro technical Commission, Information Technology - Security Techniques - Encryption Algorithms - Part 2: Asymmetric Ciphers, 2006.
- N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 48(1987), 203-209. https://doi.org/10.1090/S0025-5718-1987-0866109-5
- V. Gayoso Martinez, L. Hernandez Encinas, C. Sanchez Avila, Security and practical considerations when implementing the Elliptic Curve Integrated Encryption Scheme, preprint, 2010.
- V. S. Miller, Use of elliptic curves in cryptography, Lecture Notes in Comput.Sci.218(1986), 417-426.
- National Institute of Standards and Technology, Digital Signature Standard (DSS), 2000.
- J. H. Silverman, The Arithmetic of Elliptic Curves, volume 106 of Graduate texts in Mathematics, Springer-Verlag, New York, NY, USA, 1986.
- Standards for Efficient Cryptography Group, Test Vectors for SEC 1, 1999, http://www.secg.org/download/aid-390/gec2.pdf.
- Standards for Efficient Cryptography Group, Elliptic Curve Cryptography, 2000, http://www.secg.org/download/aid-86/sec2 final.pdf.
- Standards for Efficient Cryptography Group, Recommended Elliptic Curve Domain Parameters, 2000, http://www.secg.org/download/aid-780/sec1-v2.pdf.
- Yunho Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices," Journal of Korean Society for Internet Information, Vol.14, No.5, pp.15-21, June 2013. https://doi.org/10.7472/jksii.2013.14.3.15
- Young Bae Yoon, Junseok Oh, Bong Gyou Lee, "The Important Factors in Security for Introducing the Cloud Services," Journal of Korean Society for Internet Information, Vol. 13, No. 6, pp.33-40, Dec. 2012. https://doi.org/10.7472/jksii.2012.13.6.33
- Hee Won Myeong, Jung Ha Paik, Dong Hoon Lee, "Study on implementation of Secure HTML5 Local Storage," Journal of Korean Society for Internet Information, Vol. 13, No. 4, pp.83-93, Aug. 2012. https://doi.org/10.7472/jksii.2012.13.4.83
Cited by
- An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service vol.16, pp.3, 2015, https://doi.org/10.7472/jksii.2015.16.3.79
- Ownership-guaranteed security framework for the private data in the entrusted management environment vol.18, pp.3, 2015, https://doi.org/10.1007/s10586-015-0474-4
- Elliptic Curve Diffie-Hellman Random Keys Using Artificial Neural Network and Genetic Algorithm for Secure Data over Private Cloud vol.15, pp.3, 2016, https://doi.org/10.3923/itj.2016.77.83