Volume 27,Issue 6,2016 Table of Contents

Other Issues:  
  
Special Issue's Articles

  • 云计算安全研究专刊前言
  • 薛锐,任奎,张玉清,李晖,刘吉强,赵波,祝烈煌
  • 2016,27(6):1325-1327 [Abstract(5845)]  [View PDF(5301)256.49 K]
  • Survey on Cloud Computing Security
  • ZHANG Yu-Qing, WANG Xiao-Fei, LIU Xue-Feng and LIU Ling
  • 2016,27(6):1328-1348 [Abstract(8298)]  [View PDF(11163)816.86 K]
  • Model Constructing Method for Analyzing the Trusty of Cloud
  • ZHAO Bo, DAI Zhong-Hua, XIANG Shuang and TAO Wei
  • 2016,27(6):1349-1365 [Abstract(5396)]  [View PDF(5811)839.78 K]
  • Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZone
  • YANG Bo, FENG Deng-Guo, QIN Yu and ZHANG Ying-Jun
  • 2016,27(6):1366-1383 [Abstract(5666)]  [View PDF(7815)854.90 K]
  • Research and Application Progress of Virtual Machine Introspection Technology
  • LI Bao-Hui, XU Ke-Fu, ZHANG Peng, GUO Li, HU Yue and FANG Bin-Xing
  • 2016,27(6):1384-1401 [Abstract(5921)]  [View PDF(7198)513.10 K]
  • Security Protection Model on Live Migration for KVM Virtualization
  • FAN Wei, KONG Bin, ZHANG Zhu-Jun, WANG Ting-Ting, ZHANG Jie and HUANG Wei-Qing
  • 2016,27(6):1402-1416 [Abstract(5643)]  [View PDF(6361)804.55 K]
  • Group Provable Data Possession with Deduplication in Cloud Storage
  • WANG Hong-Yuan, ZHU Lie-Huang and LI Long-Yi-Jia
  • 2016,27(6):1417-1431 [Abstract(4977)]  [View PDF(5541)555.81 K]
  • Enforcing Access Controls on Encrypted Cloud Storage with Policy Hiding
  • LEI Lei, CAI Quan-Wei, JING Ji-Wu, LIN Jing-Qiang, WANG Zhan and CHEN Bo
  • 2016,27(6):1432-1450 [Abstract(6459)]  [View PDF(6434)674.52 K]
  • Cloud Storage Integrity Checking Scheme with Private Key Recovery Capability
  • SHEN Wen-Ting, YU Jia, YANG Guang-Yang, CHENG Xiang-Guo and HAO Rong
  • 2016,27(6):1451-1462 [Abstract(5158)]  [View PDF(5148)812.42 K]
  • Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over Exponents
  • XU Jian, LI Jian, HAN Jian, LI Fu-Xiang and ZHOU Fu-Cai
  • 2016,27(6):1463-1474 [Abstract(4871)]  [View PDF(5196)1.30 M]
  • Multi-User Binary Tree Based ORAM Scheme
  • SUN Xiao-Ni, JIANG Han and XU Qiu-Liang
  • 2016,27(6):1475-1486 [Abstract(5546)]  [View PDF(5094)420.63 K]
  • Identity-Based Fully Homomorphic Encryption from Eigenvector
  • KANG Yuan-Ji, GU Chun-Xiang, ZHENG Yong-Hui and GUANG Yan
  • 2016,27(6):1487-1497 [Abstract(5739)]  [View PDF(5588)371.92 K]
  • Key-Policy Attribute-Based Encryption Scheme for General Circuits
  • HU Peng and GAO Hai-Ying
  • 2016,27(6):1498-1510 [Abstract(4584)]  [View PDF(4686)522.13 K]
  • Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard Model
  • WEI Fu-Shan, ZHANG Gang, MA Jian-Feng and MA Chuan-Gui
  • 2016,27(6):1511-1522 [Abstract(4822)]  [View PDF(4995)445.30 K]
  • ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud Environment
  • WANG Zhong-Hua, HAN Zhen, LIU Ji-Qiang, ZHANG Da-Wei and CHANG Liang
  • 2016,27(6):1523-1537 [Abstract(5265)]  [View PDF(5380)1.04 M]
  • Trusted Cloud Tenant Separation Mechanism Supporting Transparency
  • SHI Yong, GUO Yu, LIU Ji-Qiang, HAN Zhen, MA Wei and CHANG Liang
  • 2016,27(6):1538-1548 [Abstract(5128)]  [View PDF(4823)382.98 K]
  • Secure Set Computing in Cloud Environment
  • LI Shun-Dong, ZHOU Su-Fang, GUO Yi-Min, DOU Jia-Wei and WANG Dao-Shun
  • 2016,27(6):1549-1565 [Abstract(5561)]  [View PDF(5757)421.54 K]
  • Efficient Ciphertext Search Method Based on Similarity Search Tree
  • TIAN Xue, ZHU Xiao-Jie, SHEN Pei-Song, CHEN Chi and ZOU Hong
  • 2016,27(6):1566-1576 [Abstract(5331)]  [View PDF(5780)473.04 K]
  • Efficient Conjunctive Keyword Search over Encrypted Electronic Medical Records
  • ZHANG Li-Li, ZHANG Yu-Qing, LIU Xue-Feng and QUAN Han-Yu
  • 2016,27(6):1577-1591 [Abstract(5387)]  [View PDF(5461)499.12 K]
  • Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem
  • XIANG Shi-Jun and LUO Xin-Rong
  • 2016,27(6):1592-1601 [Abstract(6063)]  [View PDF(5575)569.70 K]