Have a personal or library account? Click to login

References

  1. Chen, Zhuang, F. Qi, and C. Ye. "Research on Cloud Data Encryption Scheme Based on Chinese Cryptographic Algorithms." Journal of Information Security Research (2018).
  2. Huang, Pei, et al. "A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems." Global Communications Conference IEEE, 2017:1-6.
  3. Quang, Do Vinh, T. N. K. Hoan, and I. Koo. "Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks." IEEE Sensors Journal PP.99(2018):1-1.
  4. Liang, Kaitai, et al. "An Efficient Cloud-Based Revocable Identity- Based Proxy Re-encryption Scheme for Public Clouds Data Sharing." European Symposium on Research in Computer Security Springer, Cham, 2014:257-272.
  5. Xu, Lei, X. Wu, and X. Zhang. "CL-PRE:a certificateless proxy re-encryption scheme for secure data sharing with public cloud." ACM Symposium on Information, Computer and Communications Security ACM, 2012:87-88.
  6. Gillies, Alan. "Improving the quality of information security management systems with IS027000." Tqm Journal 23.4(2011):367-376.
  7. Publishing, It Governance. ISO27000 and Information Security: A Combined Glossary. It Governance Ltd, 2010.
  8. Wang, Chi Hsiang, and D. R. Tsai. "Integrated installing ISO 9000 and ISO 27000 management systems on an organization." 2009 International Carnahan Conference on Security Technology IEEE, 2009:265-267.
Language: English
Page range: 31 - 34
Published on: Oct 14, 2019
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2019 Liu Xin, Wei Zhiqiang, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.