Volume 27,Issue 6,2016 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 云计算安全研究专刊前言
  • 薛锐,任奎,张玉清,李晖,刘吉强,赵波,祝烈煌
  • 2016,27(6):1325-1327 [Abstract(3228)]  [View PDF(2064)256.49 K]
  • Survey on Cloud Computing Security
  • ZHANG Yu-Qing, WANG Xiao-Fei, LIU Xue-Feng and LIU Ling
  • 2016,27(6):1328-1348 [Abstract(4744)]  [View PDF(4310)816.86 K]
  • Model Constructing Method for Analyzing the Trusty of Cloud
  • ZHAO Bo, DAI Zhong-Hua, XIANG Shuang and TAO Wei
  • 2016,27(6):1349-1365 [Abstract(2916)]  [View PDF(2069)839.78 K]
  • Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZone
  • YANG Bo, FENG Deng-Guo, QIN Yu and ZHANG Ying-Jun
  • 2016,27(6):1366-1383 [Abstract(3044)]  [View PDF(3003)854.90 K]
  • Research and Application Progress of Virtual Machine Introspection Technology
  • LI Bao-Hui, XU Ke-Fu, ZHANG Peng, GUO Li, HU Yue and FANG Bin-Xing
  • 2016,27(6):1384-1401 [Abstract(3048)]  [View PDF(3081)513.10 K]
  • Security Protection Model on Live Migration for KVM Virtualization
  • FAN Wei, KONG Bin, ZHANG Zhu-Jun, WANG Ting-Ting, ZHANG Jie and HUANG Wei-Qing
  • 2016,27(6):1402-1416 [Abstract(2902)]  [View PDF(2340)804.55 K]
  • Group Provable Data Possession with Deduplication in Cloud Storage
  • WANG Hong-Yuan, ZHU Lie-Huang and LI Long-Yi-Jia
  • 2016,27(6):1417-1431 [Abstract(2547)]  [View PDF(2071)555.81 K]
  • Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding
  • LEI Lei, CAI Quan-Wei, JING Ji-Wu, LIN Jing-Qiang, WANG Zhan and CHEN Bo
  • 2016,27(6):1432-1450 [Abstract(3380)]  [View PDF(2516)674.52 K]
  • Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
  • SHEN Wen-Ting, YU Jia, YANG Guang-Yang, CHENG Xiang-Guo and HAO Rong
  • 2016,27(6):1451-1462 [Abstract(2762)]  [View PDF(2008)812.42 K]
  • Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
  • XU Jian, LI Jian, HAN Jian, LI Fu-Xiang and ZHOU Fu-Cai
  • 2016,27(6):1463-1474 [Abstract(2721)]  [View PDF(1884)1.30 M]
  • Multi-User Binary Tree Based ORAM Scheme
  • SUN Xiao-Ni, JIANG Han and XU Qiu-Liang
  • 2016,27(6):1475-1486 [Abstract(2972)]  [View PDF(2011)420.63 K]
  • Identity-Based Fully Homomorphic Encryption from Eigenvector
  • KANG Yuan-Ji, GU Chun-Xiang, ZHENG Yong-Hui and GUANG Yan
  • 2016,27(6):1487-1497 [Abstract(3189)]  [View PDF(1803)371.92 K]
  • Key-Policy Attribute-Based Encryption Scheme for General Circuits
  • HU Peng and GAO Hai-Ying
  • 2016,27(6):1498-1510 [Abstract(2397)]  [View PDF(1685)522.13 K]
  • Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model
  • WEI Fu-Shan, ZHANG Gang, MA Jian-Feng and MA Chuan-Gui
  • 2016,27(6):1511-1522 [Abstract(2438)]  [View PDF(1621)445.30 K]
  • ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud Environment
  • WANG Zhong-Hua, HAN Zhen, LIU Ji-Qiang, ZHANG Da-Wei and CHANG Liang
  • 2016,27(6):1523-1537 [Abstract(2780)]  [View PDF(1844)1.04 M]
  • Trusted Cloud Tenant Separation Mechanism Supporting Transparency
  • SHI Yong, GUO Yu, LIU Ji-Qiang, HAN Zhen, MA Wei and CHANG Liang
  • 2016,27(6):1538-1548 [Abstract(2715)]  [View PDF(1727)382.98 K]
  • Secure Set Computing in Cloud Environment
  • LI Shun-Dong, ZHOU Su-Fang, GUO Yi-Min, DOU Jia-Wei and WANG Dao-Shun
  • 2016,27(6):1549-1565 [Abstract(2916)]  [View PDF(1848)421.54 K]
  • Efficient Ciphertext Search Method Based on Similarity Search Tree
  • TIAN Xue, ZHU Xiao-Jie, SHEN Pei-Song, CHEN Chi and ZOU Hong
  • 2016,27(6):1566-1576 [Abstract(2852)]  [View PDF(2361)473.04 K]
  • Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records
  • ZHANG Li-Li, ZHANG Yu-Qing, LIU Xue-Feng and QUAN Han-Yu
  • 2016,27(6):1577-1591 [Abstract(2739)]  [View PDF(1878)499.12 K]
  • Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem
  • XIANG Shi-Jun and LUO Xin-Rong
  • 2016,27(6):1592-1601 [Abstract(3064)]  [View PDF(2077)569.70 K]