Cite

Chen, Zhuang, F. Qi, and C. Ye. "Research on Cloud Data Encryption Scheme Based on Chinese Cryptographic Algorithms." Journal of Information Security Research (2018).Chen, Zhuang, QiF., and YeC."Research on Cloud Data Encryption Scheme Based on Chinese Cryptographic Algorithms."Journal of Information Security Research2018Search in Google Scholar

Huang, Pei, et al. "A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems." Global Communications Conference IEEE, 2017:1-6.HuangPei"A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems."Global Communications Conference IEEE20171610.1109/GLOCOM.2016.7841541Search in Google Scholar

Quang, Do Vinh, T. N. K. Hoan, and I. Koo. "Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks." IEEE Sensors Journal PP.99(2018):1-1.Quang, Do Vinh, HoanT. N. K., and KooI."Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks."IEEE Sensors JournalPP.99201811Search in Google Scholar

Liang, Kaitai, et al. "An Efficient Cloud-Based Revocable Identity- Based Proxy Re-encryption Scheme for Public Clouds Data Sharing." European Symposium on Research in Computer Security Springer, Cham, 2014:257-272.LiangKaitai"An Efficient Cloud-Based Revocable Identity- Based Proxy Re-encryption Scheme for Public Clouds Data Sharing."European Symposium on Research in Computer Security Springer, Cham201425727210.1007/978-3-319-11203-9_15Search in Google Scholar

Xu, Lei, X. Wu, and X. Zhang. "CL-PRE:a certificateless proxy re-encryption scheme for secure data sharing with public cloud." ACM Symposium on Information, Computer and Communications Security ACM, 2012:87-88.Xu, Lei, WuX., and ZhangX."CL-PRE:a certificateless proxy re-encryption scheme for secure data sharing with public cloud."ACM Symposium on Information, Computer and Communications Security ACM2012878810.1145/2414456.2414507Search in Google Scholar

Gillies, Alan. "Improving the quality of information security management systems with IS027000." Tqm Journal 23.4(2011):367-376.GilliesAlan"Improving the quality of information security management systems with IS027000."Tqm Journal23.4201136737610.1108/17542731111139455Search in Google Scholar

Publishing, It Governance. ISO27000 and Information Security: A Combined Glossary. It Governance Ltd, 2010.Publishing, It Governance. ISO27000 and Information Security: A Combined Glossary. It Governance Ltd2010Search in Google Scholar

Wang, Chi Hsiang, and D. R. Tsai. "Integrated installing ISO 9000 and ISO 27000 management systems on an organization." 2009 International Carnahan Conference on Security Technology IEEE, 2009:265-267.WangChi Hsiang, and TsaiD. R."Integrated installing ISO 9000 and ISO 27000 management systems on an organization."2009 International Carnahan Conference on Security Technology IEEE200926526710.1109/CCST.2009.5335527Search in Google Scholar

eISSN:
2470-8038
Idioma:
Inglés
Calendario de la edición:
4 veces al año
Temas de la revista:
Computer Sciences, other