{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:30:58Z","timestamp":1729618258249,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.65","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"9-16","source":"Crossref","is-referenced-by-count":16,"title":["An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengfei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Rajiv","family":"Ranjan","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Georgakopoulos","sequence":"additional","affiliation":[]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Science clouds: Early experiences in cloud computing for scientific applications","author":"keahey","year":"2008","journal-title":"Proceedings of the First Workshop on Cloud Computing and Its Applications (CCA '08)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5996"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1086\/521299"},{"key":"15","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-642-19571-6_18","article-title":"Round-optimal password-based authenticated key exchange","author":"katz","year":"2011","journal-title":"Proceedings of the 8th Conference on Theory of Cryptography (TCC'11)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0361-5"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866365"},{"journal-title":"Cern Cloud Computing Joins Hunt for Origins of the Universe","year":"2013","author":"heath","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1016\/j.jpdc.2010.04.004","article-title":"Environment-conscious scheduling of hpc applications on distributed cloud-oriented data centers","volume":"71","author":"garg","year":"2011","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"12","first-page":"465","article-title":"Fully homomorphic encryption with polylog overhead","author":"gentry","year":"2012","journal-title":"Proceedings of the 2012 International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '12)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653674"},{"key":"20","first-page":"321","article-title":"Multi-recipient public-key encryption with shortened ciphertext","author":"kurosawa","year":"2002","journal-title":"Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems Public Key Cryptography (PKC '02)"},{"journal-title":"Future Generation Computer Systems","article-title":"Ccbke-session key negotiation for fast and secure scheduling of scientific applications in cloud computing","year":"2012","author":"liu","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.93"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.117"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2007.06.004"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.208"},{"key":"28","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jpdc.2010.09.003","article-title":"On-demand minimum cost benchmarking for intermediate dataset storage in scientific cloud workflow systems","volume":"71","author":"yuan","year":"2011","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.010"},{"year":"2013","key":"3"},{"year":"2013","key":"2"},{"year":"2013","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2008.5217932"},{"journal-title":"Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography (PKC '03)","article-title":"Randomness re-use in multi-recipient encryption schemeas","year":"2003","author":"bellare","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462217"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951432"},{"year":"2013","key":"5"},{"journal-title":"MIRACL Cryptography Library","year":"2013","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213558"},{"key":"8","first-page":"143","article-title":"Security analysis of ike's signature-based key-exchange protocol","author":"canetti","year":"2002","journal-title":"Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '02)"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680817.pdf?arnumber=6680817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:42Z","timestamp":1498091202000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.65","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}