In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verif...
With the development of network technology, privacy protection and users anonymity become a new rese...
LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICI...
It is practiced for users to influence cloud storage services to contribute to data with others in a...
The Cloud computing is a rising technique which offers information sharing are more, and efficient e...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Cloud computing gives customers instant access to a network of remote servers, networks, and data ce...
Due to its openness, data speaking about is continually organized within the hostile setting and unc...
Abstract—Cloud computing is one of the fastest growing segments of IT industry since the users ’ com...
Data can be stored in cloud and also shared among multiple users. But the correctness of data presen...
Abstract:Security is the primary factor while transmission of data between cloud servers and end use...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
With the development of network technology, privacy protection and users anonymity become a new rese...
The security of the signature scheme is destroyed because its secret information of the signature sy...
With the development of network technology, privacy protection and users anonymity become a new rese...
LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICI...
It is practiced for users to influence cloud storage services to contribute to data with others in a...
The Cloud computing is a rising technique which offers information sharing are more, and efficient e...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on...
Cloud computing gives customers instant access to a network of remote servers, networks, and data ce...
Due to its openness, data speaking about is continually organized within the hostile setting and unc...
Abstract—Cloud computing is one of the fastest growing segments of IT industry since the users ’ com...
Data can be stored in cloud and also shared among multiple users. But the correctness of data presen...
Abstract:Security is the primary factor while transmission of data between cloud servers and end use...
There are many applications in which it is necessary to transmit authenticatable messages while achi...
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates...
With the development of network technology, privacy protection and users anonymity become a new rese...
The security of the signature scheme is destroyed because its secret information of the signature sy...
With the development of network technology, privacy protection and users anonymity become a new rese...
LNCS v. 7043 has title: Information and communications security : 13th International Conference, ICI...
It is practiced for users to influence cloud storage services to contribute to data with others in a...