[HTML][HTML] A survey of fault tolerance in cloud computing

P Kumari, P Kaur - Journal of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing has brought about a transformation in the delivery model of information
technology from a product to a service. It has enabled the availability of various software …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Secure multi-party computation: theory, practice and applications

C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li… - Information Sciences, 2019 - Elsevier
Abstract Secure Multi-Party Computation (SMPC) is a generic cryptographic primitive that
enables distributed parties to jointly compute an arbitrary functionality without revealing their …

A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds

C Ge, W Susilo, J Baek, Z Liu, J **a… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
To manage outsourced encrypted data sharing in clouds, attribute-based proxy re-
encryption (ABPRE) has become an elegant primitive. In ABPRE, a cloud server can …

An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks

M Ma, D He, H Wang, N Kumar… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang - Journal of Network and …, 2018 - Elsevier
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …

Enabling efficient and geometric range query with access control over encrypted spatial data

G Xu, H Li, Y Dai, K Yang, X Lin - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As a basic query function, range query has been exploited in many scenarios such as SQL
retrieves, location-based services, and computational geometry. Meanwhile, with explosive …

Bus-trajectory-based street-centric routing for message delivery in urban vehicular ad hoc networks

G Sun, Y Zhang, D Liao, H Yu, X Du… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper focuses on the routing algorithm for the communications between vehicles and
places in urban vehicular ad hoc networks. As one of the basic transportation facilities in an …

A privacy-preserving and untraceable group data sharing scheme in cloud computing

J Shen, H Yang, P Vijayakumar… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the development of cloud computing, the great amount of storage data requires safe
and efficient data sharing. In multiparty storage data sharing, first, the confidentiality of …

Quantum-safe round-optimal password authentication for mobile devices

Z Li, D Wang, E Morais - IEEE transactions on dependable and …, 2020 - ieeexplore.ieee.org
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …