References
- S. S. M. Chow, Y. J. He, L. C. K. Hui, and S.-M. Yiu, "SPICE-Simple Privacy-Preserving Identity-Management for Cloud Environment," ACNS 2012, LNCS 7341, pp. 526-543, 2012.
- U. Somani, K. Lakhani, and M. Mundra, "Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," 2010 1st International Conference on Parallel, Distributed and Grid Computing, pp. 211-216, 2012.
- G. Zhaio, C. Rong, J. Li, F. Zhang, and Y. Tang, "Trusted Data Sharing over Untrusted Cloud Storage Providers," IEEE International Conference on Cloud Computing Technology and Science, pp. 97-103, 2010
- C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage," IEEE Transactions on Parallel and Distributed Systems, Vol 25, No.2, pp. 468-477, 2014. https://doi.org/10.1109/TPDS.2013.112
- S. Kamara and K. Lauater, "Cryptographic Cloud Storage," Financial Cryptography and Data Security 2010, LNCS 6054, pp. 136-149, 2010.
- L. Arockiam1 and S. Monikandan, "Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm," International Journal of Advanced Research in Computer and Communication Engineering, Vol 2, No.8, pp. 3064-3070, 2013.
- A. Shamir, "How to share a secret," Communications of the ACM, Vol 22, No.11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
- X. Cao, W. Kou, and X. Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Information Sciences, Vol. 180, No.15, pp. 2895-2903, 2010. https://doi.org/10.1016/j.ins.2010.04.002