A Threshold Cryptosystem in Secure Cloud Computations
Information security in cloud computing technology is actively investigated by the world scientific community. They uses the internet and the central remote servers to provide and maintain data as well as applications. This users' data files can be accessed and manipulated by any other users. S...
Main Authors: | N. P. Varnovskij, S. A. Martishin, M. V. Khrapchenko, A. V. Shokurov |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/800 |
Similar Items
-
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
by: Ph. Burtyka
Published: (2018-10-01) -
Derandomization Security of Homomorphic Encryption
by: A. . Trepacheva
Published: (2018-10-01) -
AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
by: U. A. Vishniakou, et al.
Published: (2019-06-01) -
JINR Cloud Service: Status and Perspectives
by: N. . Balashov, et al.
Published: (2018-10-01) -
HPC cloud system design and implementation
by: A. O. Kudryavtsev, et al.
Published: (2018-10-01)