<video id="en21j"><xmp id="en21j">

  • <big id="en21j"></big>

    <source id="en21j"></source>

      <sup id="en21j"><dd id="en21j"><rp id="en21j"></rp></dd></sup>
      1. 西安济通电气有限公司

        研发生产型企业

        行业新闻

        主页 > 行业新闻

        行业新闻

        面向“互联网+”的公有云数据安全

        发布时间:2018-07-07 18:01

        [1] MCMILLAN R . Cloud computing a ‘security nightmare’,says Cisco CEO[EB/OL].(2014-07-02)[2016-10-09]. .

        [2] HARAUZ J , KAUFMAN L M , POTTER B . Data security in the world of cloud computing[J]. IEEE Security & Privacy, 2009,7(4): 61-64.

        [3] GUO F D , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.

        [4] 王笑帝, 张云勇, 刘镝 ,等. 云计算虚拟化安全技术研究[J]. 电信科学, 2015,31(6): 8-12,24. WANG X D , ZHANG Y Y , LIU D ,et al. Research on security of virtualization on cloud computing[J]. Telecommunications Science, 2015,31(6): 8-12,24.

        [5] 张逢喆 . 公共云计算环境下用户数据的隐私性与安全性;D]. 上海:复旦大学, 2010. ZHANG F Z . Privacy and security protection of user data in public cloud computing environment[D]. Shanghai:Fudan University, 2010.

        [6] CHOI S G , HWANGY K W , KATZ J ,et al. Secure multi-party computation of boolean circuits with applications to privacy in online marketplaces[M]. Berlin: Springer Berlin HeidelbergPress, 2012.

        [7] AGRAWAL R , SRIKANT R . Privacy-preserving data mining[J]. Application Research of Computers, 2000,29(2): 439-450.

        [8] LOFTUS J , SMART N P . Secure outsourced computation[M]. Berlin: Springer Berlin HeidelbergPress, 2010.

        [9] TOFT T , . Secure data structures based on multi-party computation[C]// The 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing,June 6-8,2011,San Jose,California,USA. New York:ACM Press, 2011: 291-292.

        [10] 刘明辉, 张尼, 张云勇 ,等. 云环境下的敏感数据;ぜ际跹芯縖J]. 电信科学, 2014,30(11): 2-8. LIU M H , ZHANG N , ZHANG Y Y ,et al. Research on sensitive data protection technology on cloud computing[J]. Telecommunications Science, 2014,30(11): 2-8.

        [11] 李浪, 余孝忠, 杨娅琼 ,等. 同态加密研究进展综述[J]. 计算机应用研究, 2015(11): 3209-3214. LI L , YU X Z , YANG Y Q ,et al. Survey on homomorphic encryption technology[J]. Application Research of Computers, 2015(11): 3209-3214.

        [12] 李顺东, 窦家维, 王道顺 . 同态加密算法及其在云安全中的应用[J]. 计算机研究与发展, 2015,52(6): 1378-1388. LI S D , DOU J W , WANG D S . Survey on homomorphic encryption and its applications to cloud security[J]. Journal of Computer Research and Development, 2015,52(6): 1378-1388.

        [13] RIVEST R , ADLEMAN L , DERTOUZOS M . On data banks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978,4(11): 169-180.

        [14] 任福乐, 朱志祥, 王雄 . 基于全同态加密的云计算数据安全方案[J]. 西安邮电大学学报, 2013,18(3): 92-95. REN F L , ZHU Z X , WANG X . A cloud computing security solution based on fully homomorphic encryption[J]. Journal of Xi’an University of Post and Telecom, 2013,18(3): 92-95.

        [15] 王辉 . 同态加密的分析与优化[D]. 杭州:杭州电子科技大学, 2012. WANG H . Homomorphic encryption:analysis and optimization[D]. Hangzhou:Hangzhou Dianzi University, 2012.

        [16] ELGAMAL T . A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985,31(4): 469-472.

        [17] PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// The 17th international conference on Theory and application of cryptographic techniques,May 2-6,1999,Prague,Czech Republic. New York:ACM Press, 1999: 223-238.

        [18] BENALOH J . Verifiable scret-ballot elections[D]. New Haven:Yale University, 1988.

        [19] OKAMOTO T , UCHIYAMA S . A new public-key cryptosystem as secure as factoring[C]// International Conference on the Theory & Applications of Cryptographic Techniques,May 31-June 4,1998,Espoo,Finland. Berlin:Springer, 1998: 308-318.

        [20] NACCACHE D , STERN J . A new public key cryptosystem based on higher residues[C]// The 5th ACM Conference on Computer and Communications Security,November 2-5,1998,San Francisco,California,USA. New York:ACM Press, 1998: 59-66.

        [21] DAN B , GOH E J , NISSIM K . Evaluating 2-DNF formulas on cipher texts[C]// The 2nd International Conference on Theory of Cryptography,February 10-12,2005,Cambridge,England. Berlin:Springer, 2005: 325-341.

        [22] FELLOWS M , KOBLITZ N . Combinatorial cryptosystems galore[J]. Contemporary Mathematics, 1994(1): 51-61.

        [23] GENTRY C , . Fully homomorphic eneryption using ideal lattices[C]// The 41st Annual ACM Symposium on Theory of Computing,May 31-June 2,2009,Bethesda,MD,USA. New York:ACM Press, 2009: 169-178.

        [24] GENTRY C . A fully homomorphic encryption scheme[D]. Stanford:Stanford University, 2009.

        物联网产品 用智慧系统改变人们的生产生活状况

        智能仪器仪表定制开发 物联网平台设计 物联网无磁水表 智慧水务 各种流量计定制开发 西安嵌入式开发生产 物联网水表?

        快3投注