Abstract is missing.
- Cloud Data Analytics for Security: Applications, Challenges, and OpportunitiesDanfeng (Daphne) Yao. 1 [doi]
- To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation VerificationBalazs Pejo, Qiang Tang 0001. 3-10 [doi]
- Reconciling Security and Functional Requirements in Multi-tenant CloudsGhassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf. 11-18 [doi]
- Cloud Storage File RecoverabilityChristian A. Gorke, Frederik Armknecht, Christian Janson, Carlos Cid. 19-26 [doi]
- A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the CloudShaojing Fu, Yunpeng Yu, Ming Xu. 27-33 [doi]
- Efficient Key-Rotatable and Security-Updatable Homomorphic EncryptionYoshinori Aono, Takuya Hayashi 0001, Le Trieu Phong, Lihua Wang. 35-42 [doi]
- Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and SetupLukasz Krzywiecki, Miroslaw Kutylowski. 43-50 [doi]
- Enabling Privacy-assured Mobile Advertisement Targeting and DisseminationZhenkui Shi, Xiaoning Liu, Xingliang Yuan. 51-57 [doi]
- Privacy-preserving Hybrid Recommender SystemQiang Tang 0001, Husen Wang. 59-66 [doi]
- Efficient Implementation of a Proxy-based Protocol for Data Sharing on the CloudMaryam Sepehri, Stelvio Cimato, Ernesto Damiani. 67-74 [doi]
- Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVMJun Zhang, Xin Wang, Siu-Ming Yiu, Zoe L. Jiang, Jin Li. 75-82 [doi]
- A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification SystemPengchuan Su, Nan Sun, Liehuang Zhu, Yandong Li, RongRong Bi, Meng Li, Zijian Zhang. 83-90 [doi]