Deep search:Searching for "cloud storage" in 'ABSTRACT and KEYWORDGot 8 items.
index Title
1Optimizing storage performance in public cloud platforms
Author(s):Jian-zong Wang, Peter Varman, Chan...  Clicked:10001  Download:4650  Cited:6  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.12 P.951-964  DOI:10.1631/jzus.C1100097
2Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
Author(s):Yong Cheng, Zhi-ying Wang, Jun Ma,...  Clicked:10752  Download:8474  Cited:14  <Full Text>
Journal of Zhejiang University Science C  2013 Vol.14 No.2 P.85-97  DOI:10.1631/jzus.C1200240
3NaEPASC: a novel and efficient public auditing scheme for cloud data
Author(s):Shuang Tan, Yan Jia  Clicked:10574  Download:4889  Cited:7  <Full Text>  <PPT> 2295
Journal of Zhejiang University Science C  2014 Vol.15 No.9 P.794-804  DOI:10.1631/jzus.C1400045
4Cryptanalysis of an identity-based public auditing protocol for cloud storage
Author(s):Li-bing Wu, Jing Wang, De-biao He,...  Clicked:7992  Download:2650  Cited:0  <Full Text>  <PPT> 2066
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.12 P.1972-1977  DOI:10.1631/FITEE.1601530
5Generic user revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Hai Jian...  Clicked:6112  Download:2594  Cited:0  <Full Text>  <PPT> 1913
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.11 P.1362-1384  DOI:10.1631/FITEE.1800405
6A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage
Author(s):Xin Wang, Bo Yang, Zhe Xia, Hong-x...  Clicked:7907  Download:2302  Cited:0  <Full Text>  <PPT> 1811
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.787-800  DOI:10.1631/FITEE.1800066
7Generic attribute revocation systems for attribute-based encryption in cloud storage
Author(s):Genlang Chen, Zhiqian Xu, Jia-jian...  Clicked:6404  Download:2107  Cited:0  <Full Text>  <PPT> 1784
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.6 P.773-786  DOI:10.1631/FITEE.1800512
8MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Author(s):Mukti Padhya, Devesh C. Jinwala  Clicked:6654  Download:3042  Cited:0  <Full Text>  <PPT> 1541
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.12 P.1717-1748  DOI:10.1631/FITEE.1800192
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE