共 37 条
- [1] Al-Anzi F.S., Yadav S.K., Soni J., Cloud computing: Security model comprising governance, risk management, and compliance, International Conference on Data Mining and Intelligent Computing (ICDMIC), pp. 1-6, (2014)
- [2] Aneja M.J.S., Bhatia T., Sharma G., Shrivastava G., Artificial intelligence based intrusion detection system to detect flooding attack in VANETs, Handbook of Research on Network Forensics and Analysis Techniques, pp. 87-100, (2018)
- [3] Arora A., Yadav S.K., Sharma K., Denial-of-service (DoS) attack and botnet: Network analysis, research tactics, and mitigation, Handbook of Research on Network Forensics and Analysis Techniques, pp. 117-141, (2018)
- [4] Bellare M., Goldreich O., Goldwasser S., Crypto '94, 839, pp. 216-233, (1994)
- [5] Bellare M., Goldreich O., Goldwasser S., Proc. 27th Symposium on the Theory of Computing, pp. 45-56, (1995)
- [6] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy (SP'07), pp. 321-334, (2007)
- [7] Blaze M., Bleumer G., Strauss M., Divertible protocols and atomic proxy cryptography, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 127-144, (1998)
- [8] Boneh D., Franklin M., Identity-based encryption from the Weil pairing, Annual International Cryptology Conference, pp. 213-229, (2001)
- [9] Boneh D., Waters B., Conjunctive, subset, and range queries on encrypted data, Theory of Cryptography Conference, pp. 535-554, (2007)
- [10] Bowers K.D., Juels A., Oprea A., HAIL: A high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187-198, (2009)