Volume 27,Issue 6,2016 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 云计算安全研究专刊前言
  • 薛锐,任奎,张玉清,李晖,刘吉强,赵波,祝烈煌
  • 2016,27(6):1325-1327 [Abstract(3520)]  [View PDF(2289)256.49 K]
  • Survey on Cloud Computing Security
  • ZHANG Yu-Qing, WANG Xiao-Fei, LIU Xue-Feng and LIU Ling
  • 2016,27(6):1328-1348 [Abstract(5072)]  [View PDF(4757)816.86 K]
  • Model Constructing Method for Analyzing the Trusty of Cloud
  • ZHAO Bo, DAI Zhong-Hua, XIANG Shuang and TAO Wei
  • 2016,27(6):1349-1365 [Abstract(3181)]  [View PDF(2397)839.78 K]
  • Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZone
  • YANG Bo, FENG Deng-Guo, QIN Yu and ZHANG Ying-Jun
  • 2016,27(6):1366-1383 [Abstract(3281)]  [View PDF(3271)854.90 K]
  • Research and Application Progress of Virtual Machine Introspection Technology
  • LI Bao-Hui, XU Ke-Fu, ZHANG Peng, GUO Li, HU Yue and FANG Bin-Xing
  • 2016,27(6):1384-1401 [Abstract(3418)]  [View PDF(3258)513.10 K]
  • Security Protection Model on Live Migration for KVM Virtualization
  • FAN Wei, KONG Bin, ZHANG Zhu-Jun, WANG Ting-Ting, ZHANG Jie and HUANG Wei-Qing
  • 2016,27(6):1402-1416 [Abstract(3161)]  [View PDF(2578)804.55 K]
  • Group Provable Data Possession with Deduplication in Cloud Storage
  • WANG Hong-Yuan, ZHU Lie-Huang and LI Long-Yi-Jia
  • 2016,27(6):1417-1431 [Abstract(2772)]  [View PDF(2301)555.81 K]
  • Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding
  • LEI Lei, CAI Quan-Wei, JING Ji-Wu, LIN Jing-Qiang, WANG Zhan and CHEN Bo
  • 2016,27(6):1432-1450 [Abstract(3703)]  [View PDF(2676)674.52 K]
  • Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
  • SHEN Wen-Ting, YU Jia, YANG Guang-Yang, CHENG Xiang-Guo and HAO Rong
  • 2016,27(6):1451-1462 [Abstract(3115)]  [View PDF(2240)812.42 K]
  • Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
  • XU Jian, LI Jian, HAN Jian, LI Fu-Xiang and ZHOU Fu-Cai
  • 2016,27(6):1463-1474 [Abstract(2986)]  [View PDF(2055)1.30 M]
  • Multi-User Binary Tree Based ORAM Scheme
  • SUN Xiao-Ni, JIANG Han and XU Qiu-Liang
  • 2016,27(6):1475-1486 [Abstract(3245)]  [View PDF(2185)420.63 K]
  • Identity-Based Fully Homomorphic Encryption from Eigenvector
  • KANG Yuan-Ji, GU Chun-Xiang, ZHENG Yong-Hui and GUANG Yan
  • 2016,27(6):1487-1497 [Abstract(3462)]  [View PDF(1977)371.92 K]
  • Key-Policy Attribute-Based Encryption Scheme for General Circuits
  • HU Peng and GAO Hai-Ying
  • 2016,27(6):1498-1510 [Abstract(2644)]  [View PDF(1781)522.13 K]
  • Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model
  • WEI Fu-Shan, ZHANG Gang, MA Jian-Feng and MA Chuan-Gui
  • 2016,27(6):1511-1522 [Abstract(2702)]  [View PDF(1765)445.30 K]
  • ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud Environment
  • WANG Zhong-Hua, HAN Zhen, LIU Ji-Qiang, ZHANG Da-Wei and CHANG Liang
  • 2016,27(6):1523-1537 [Abstract(3065)]  [View PDF(2150)1.04 M]
  • Trusted Cloud Tenant Separation Mechanism Supporting Transparency
  • SHI Yong, GUO Yu, LIU Ji-Qiang, HAN Zhen, MA Wei and CHANG Liang
  • 2016,27(6):1538-1548 [Abstract(2960)]  [View PDF(1860)382.98 K]
  • Secure Set Computing in Cloud Environment
  • LI Shun-Dong, ZHOU Su-Fang, GUO Yi-Min, DOU Jia-Wei and WANG Dao-Shun
  • 2016,27(6):1549-1565 [Abstract(3252)]  [View PDF(2115)421.54 K]
  • Efficient Ciphertext Search Method Based on Similarity Search Tree
  • TIAN Xue, ZHU Xiao-Jie, SHEN Pei-Song, CHEN Chi and ZOU Hong
  • 2016,27(6):1566-1576 [Abstract(3149)]  [View PDF(2612)473.04 K]
  • Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records
  • ZHANG Li-Li, ZHANG Yu-Qing, LIU Xue-Feng and QUAN Han-Yu
  • 2016,27(6):1577-1591 [Abstract(3011)]  [View PDF(2069)499.12 K]
  • Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem
  • XIANG Shi-Jun and LUO Xin-Rong
  • 2016,27(6):1592-1601 [Abstract(3362)]  [View PDF(2290)569.70 K]