Editorial Board
Contents
Distributed scheduling with probabilistic and fuzzy classifications of processes
On the energy footprint of I/O management in Exascale HPC systems
Provably secure robust optimistic fair exchange of distributed signatures
Key based data analytics across data centers considering bi-level resource provision in cloud computing
Cloud Cryptography: Theory, Practice and Future Research Directions
Garbled computation in cloud
Secure searches in the cloud: A survey
Memory leakage-resilient searchable symmetric encryption
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Probability-based reversible image authentication scheme for image demosaicking
Entangled cloud storage
Highly privacy-protecting data sharing in a tree structure
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
Enabled/disabled predicate encryption in clouds
Efficient and privacy-preserving skyline computation framework across domains
Two Schemes of Privacy-Preserving Trust Evaluation
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
Batch Public Key Cryptosystem with batch multi-exponentiation