Cargando…
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing
Current cloud computing causes serious restrictions to safeguarding users’ data privacy. Since users’ sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users’ sensitive data may be leaked by service providers. Program obfuscati...
Autores principales: | Li, Yahong, Wei, Jianzhou, Wu, Bin, Wang, Chunli, Wang, Caifen, Zhang, Yulei, Yang, Xiaodong |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8051800/ https://www.ncbi.nlm.nih.gov/pubmed/33861767 http://dx.doi.org/10.1371/journal.pone.0250259 |
Ejemplares similares
-
Secure Obfuscation for Encrypted Group Signatures
por: Shi, Yang, et al.
Publicado: (2015) -
Encryption and Obfuscation Support in EOS
por: Peters, Andreas Joachim
Publicado: (2022) -
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
por: Yang, Xiaodong, et al.
Publicado: (2021) -
Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-'
por: Heiderich, Mario, et al.
Publicado: (2010) -
Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation
por: Thirumalaisamy, Manikandan, et al.
Publicado: (2022)