Login / Signup
SCC@ASIACCS
2013
2015
2013
2015
Keyphrases
Publications
2015
Navid Pustchi
,
Ram Krishnan
,
Ravi S. Sandhu
Authorization Federation in IaaS Multi Cloud.
SCC@ASIACCS
(2015)
Masaya Yasuda
,
Takeshi Koshiba
,
Takeshi Shimoyama
,
Jun Kogure
,
Kazuhiro Yokoyama
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
SCC@ASIACCS
(2015)
Sergiu Carpov
,
Paul Dubrulle
,
Renaud Sirdey
Armadillo: A Compilation Chain for Privacy Preserving Applications.
SCC@ASIACCS
(2015)
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015
SCC@ASIACCS
(2015)
Shlomi Dolev
,
Niv Gilboa
,
Ximing Li
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
SCC@ASIACCS
(2015)
Michael Backes
,
Martin Gagné
,
Sri Aravinda Krishnan Thyagarajan
Fully Secure Inner-Product Proxy Re-Encryption with Constant Size Ciphertext.
SCC@ASIACCS
(2015)
Kevin Körner
,
Thomas Walter
,
Michael Menth
Data Freshness for Non-Trusted Environments Using Disposable Certificates.
SCC@ASIACCS
(2015)
Kui Ren
Secure Outsourcing Image Feature Extraction: Challenges and Solutions.
SCC@ASIACCS
(2015)
Akshayaram Srinivasan
,
C. Pandu Rangan
Certificateless Proxy Re-Encryption Without Pairing: Revisited.
SCC@ASIACCS
(2015)
Giuseppe Ateniese
,
Özgür Dagdelen
,
Ivan Damgård
,
Daniele Venturi
Entangled Encodings and Data Entanglement.
SCC@ASIACCS
(2015)
2014
Junchao Wu
,
Qun Liu
,
Xiaofeng Liao
A secure and efficient outsourceable group key transfer protocol in cloud computing.
SCC@ASIACCS
(2014)
Rasha Salah Omar
,
Ahmed El-Mahdy
,
Erven Rohou
Arbitrary control-flow embedding into multiple threads for obfuscation: a preliminary complexity and performance analysis.
SCC@ASIACCS
(2014)
Jianying Zhou
On the security of cloud data storage and sharing.
SCC@ASIACCS
(2014)
Nicolae Paladi
,
Antonis Michalas
,
Christian Gehrmann
Domain based storage protection with secure access control for the cloud.
SCC@ASIACCS
(2014)
Liang Feng Zhang
,
Reihaneh Safavi-Naini
,
Xiao Wei Liu
Verifiable local computation on distributed data.
SCC@ASIACCS
(2014)
Fangzhou Yao
,
Read Sprabery
,
Roy H. Campbell
CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud.
SCC@ASIACCS
(2014)
Lakshmi Kuppusamy
,
Jothi Rangasamy
,
Praveen Gauravaram
On secure outsourcing of cryptographic computations to cloud.
SCC@ASIACCS
(2014)
Hassan Takabi
Privacy aware access control for data sharing in cloud computing environments.
SCC@ASIACCS
(2014)
Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014
SCC@ASIACCS
(2014)
Zhangjie Fu
,
Jiangang Shu
,
Xingming Sun
,
Daxing Zhang
Semantic keyword search based on trie over encrypted cloud data.
SCC@ASIACCS
(2014)
Brian J. Choi
,
Kun Sun
,
Seonho Choi
Cloud-based user authentication with geo-temporal queries on smartphones.
SCC@ASIACCS
(2014)
2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013
SCC@ASIACCS
(2013)
Jinbo Xiong
,
Zhiqiang Yao
,
Jianfeng Ma
,
Ximeng Liu
,
Qi Li
,
Tao Zhang
PRAM: privacy preserving access management scheme in cloud services.
SCC@ASIACCS
(2013)
Robert H. Deng
Secure access to outsourced data.
SCC@ASIACCS
(2013)
Youwen Zhu
,
Rui Xu
,
Tsuyoshi Takagi
Secure k-NN computation on encrypted cloud data without sharing key with query users.
SCC@ASIACCS
(2013)
Zhan Wang
,
Kun Sun
,
Jiwu Jing
,
Sushil Jajodia
Verification of data redundancy in cloud storage.
SCC@ASIACCS
(2013)
Yan Zhu
,
Di Ma
,
Changjun Hu
,
Dijiang Huang
How to use attribute-based encryption to implement role-based access control in the cloud.
SCC@ASIACCS
(2013)
Lei Xu
,
Xiaoxin Wu
Hub: heterogeneous bucketization for database outsourcing.
SCC@ASIACCS
(2013)
Gang Sheng
,
Tao Wen
,
Quan Guo
,
Ying Yin
Verifying correctness of inner product of vectors in cloud computing.
SCC@ASIACCS
(2013)
Diego Perez-Botero
,
Jakub Szefer
,
Ruby B. Lee
Characterizing hypervisor vulnerabilities in cloud computing servers.
SCC@ASIACCS
(2013)
Sumanta Sarkar
,
Reihaneh Safavi-Naini
,
Liang Feng Zhang
RAFR: remote assessment of file redundancy.
SCC@ASIACCS
(2013)
Jiawei Yuan
,
Shucheng Yu
Proofs of retrievability with public verifiability and constant communication cost in cloud.
SCC@ASIACCS
(2013)