Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
Zhusen LiuWeizheng WangYutong YeNan MinZhenfu CaoLu ZhouZhe LiuPublished in: IEEE Trans. Inf. Forensics Secur. (2024)
Keyphrases
- cloud computing
- security issues
- cloud storage
- private cloud
- identity management
- secure manner
- cloud computing environment
- computing resources
- middleware architecture
- data center
- data management
- distributed computing
- internet services
- cloud computing platform
- big data
- key agreement protocol
- trusted computing
- business models
- cloud services
- mobile devices
- security analysis
- cost effective
- service providers
- computing paradigm
- computing infrastructure
- mobile users
- map reduce
- service level agreements
- key management
- mobile services
- mobile technologies
- cloud platform
- mobile learning
- mobile phone
- mobile computing