TY - JOUR AU - Rathore, S. AU - Sharma, P. K. AU - Park, J. H. PY - 2017 DA - 2017// TI - XSSClassifier: an efficient XSS attack detection approach based on machine learning classifier on SNSs JO - J Inf Process Syst VL - 13 ID - Rathore2017 ER - TY - JOUR AU - Rathore, S. AU - Park, J. H. PY - 2018 DA - 2018// TI - Semi-supervised learning based distributed attack detection framework for IoT JO - Appl Soft Comput VL - 72 UR - https://doi.org/10.1016/j.asoc.2018.05.049 DO - 10.1016/j.asoc.2018.05.049 ID - Rathore2018 ER - TY - JOUR AU - Rathore, S. AU - Loia, V. AU - Park, J. H. PY - 2018 DA - 2018// TI - SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on Facebook JO - Appl Soft Comput VL - 67 UR - https://doi.org/10.1016/j.asoc.2017.09.032 DO - 10.1016/j.asoc.2017.09.032 ID - Rathore2018 ER - TY - JOUR AU - Rathore, S. AU - Sangaiah, A. K. AU - Park, J. H. PY - 2018 DA - 2018// TI - A novel framework for internet of knowledge protection in social networking services JO - J Comput Sci VL - 26 UR - https://doi.org/10.1016/j.jocs.2017.12.010 DO - 10.1016/j.jocs.2017.12.010 ID - Rathore2018 ER - TY - CHAP AU - Kamara, S. e. n. y. AU - Lauter, K. r. i. s. t. i. n. PY - 2010 DA - 2010// TI - Cryptographic Cloud Storage BT - Financial Cryptography and Data Security PB - Springer Berlin Heidelberg CY - Berlin, Heidelberg UR - https://doi.org/10.1007/978-3-642-14992-4_13 DO - 10.1007/978-3-642-14992-4_13 ID - Kamara2010 ER - TY - JOUR AU - Liu, Q. AU - Wang, G. AU - Wu, J. PY - 2014 DA - 2014// TI - Time-based proxy re-encryption scheme for secure data sharing in a cloud environment JO - Inf Sci VL - 258 UR - https://doi.org/10.1016/j.ins.2012.09.034 DO - 10.1016/j.ins.2012.09.034 ID - Liu2014 ER - TY - STD TI - Mishra B, Jena D (2018) CCA secure proxy re-encryption scheme for secure sharing of files through cloud storage. In 2018 fifth international conference on emerging applications of information technology (EAIT). IEEE, Piscataway, pp 1–6 ID - ref7 ER - TY - JOUR AU - Li, J. AU - Zhang, Y. AU - Chen, X. AU - Xiang, Y. PY - 2018 DA - 2018// TI - Secure attribute-based data sharing for resource-limited users in cloud computing JO - Comput & Secur VL - 72 UR - https://doi.org/10.1016/j.cose.2017.08.007 DO - 10.1016/j.cose.2017.08.007 ID - Li2018 ER - TY - JOUR AU - Liu, Z. AU - Li, T. AU - Li, P. AU - Jia, C. AU - Li, J. PY - 2018 DA - 2018// TI - Verifiable searchable encryption with aggregate keys for data sharing system JO - Future Gener Comput Syst VL - 78 UR - https://doi.org/10.1016/j.future.2017.02.024 DO - 10.1016/j.future.2017.02.024 ID - Liu2018 ER - TY - JOUR AU - Chu, C. K. AU - Chow, S. S. M. AU - Tzeng, W. G. AU - Zhou, J. AU - Deng, R. H. PY - 2014 DA - 2014// TI - Key-aggregate cryptosystem for scalable data sharing in cloud storage JO - IEEE Trans Parallel Distrib Syst VL - 25 UR - https://doi.org/10.1109/TPDS.2013.112 DO - 10.1109/TPDS.2013.112 ID - Chu2014 ER - TY - STD TI - Haeger ES, Schurig K, Cenname M, et al. (2015) Crypto proxy for cloud storage services: U.S. Patent 9,137,222[P]. 2015-9-15 ID - ref11 ER - TY - STD TI - Xu L, Wu X, Zhang X (2012) CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM symposium on information, computer and communications security. ACM, New York, pp 87–88 ID - ref12 ER - TY - STD TI - Shor PW (1994) Algorithms for quantum computation: Discrete logarithms and factoring. Proceeding of FOCS 1994, Santa Fe, New Mexico, November 20–22, 1994, pp 124-134 ID - ref13 ER - TY - JOUR AU - Shor, P. W. PY - 1999 DA - 1999// TI - Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer JO - SIAM Rev VL - 41 UR - https://doi.org/10.1137/S0036144598347011 DO - 10.1137/S0036144598347011 ID - Shor1999 ER - TY - JOUR AU - Mceliece, R. J. PY - 1978 DA - 1978// TI - A public-key cryptosystem based on algebraic coding theory JO - Deep Space Netw Prog Rep VL - 42–44 ID - Mceliece1978 ER - TY - STD TI - Bernstein DJ (2009) Introduction to post-quantum cryptography. In: Post-quantum cryptography, Springer, Berlin. pp 1–14 ID - ref16 ER - TY - STD TI - Loidreau P (2017) A new rank metric codes based encryption scheme. In: Lange T, Takagi T (eds.) PQCrypto 2017. LNCS, 10346, pp 3–17 ID - ref17 ER - TY - CHAP AU - Lau, T. e. r. r. y. S. h. u. e. C. h. i. e. n. AU - Tan, C. h. i. k. H. o. w. PY - 2018 DA - 2018// TI - A New Encryption Scheme Based on Rank Metric Codes BT - Information Security and Privacy PB - Springer International Publishing CY - Cham UR - https://doi.org/10.1007/978-3-319-93638-3_43 DO - 10.1007/978-3-319-93638-3_43 ID - Lau2018 ER - TY - STD TI - Gaborit P, Hauteville A, Phan DH, Tillich J-P (2017) Identity-based encryption from codes with rank metric. In: Katz J, Shacham H (eds.) CRYPTO 2017. LNCS, 10403, pp 194–224 ID - ref19 ER - TY - JOUR AU - Kobara, K. AU - Imai, H. PY - 2001 DA - 2001// TI - Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC JO - Int Workshop Pract Theory Public Key Cryptogr Public Key Cryptogr VL - 1992 ID - Kobara2001 ER - TY - JOUR AU - Bellare, M. AU - Rogaway, P. PY - 1994 DA - 1994// TI - Optimal asymmetric encryption JO - Eurocrypto VL - 950 ID - Bellare1994 ER - TY - JOUR AU - Wang, Y. PY - 2016 DA - 2016// TI - Quantum resistant random linear code based public key encryption scheme RLCE JO - IEEE Int Symp Inf Theory (ISIT) VL - 2016 ID - Wang2016 ER - TY - JOUR AU - Horlemann-Trautmann, A. L. AU - Marshall, K. AU - Rosenthal, J. PY - 2015 DA - 2015// TI - Extension of overbeck’s attack for gabidulin based cryptosystems JO - Des Codes Cryptogr VL - 86 ID - Horlemann-Trautmann2015 ER - TY - JOUR AU - Otmani, A. AU - Kalachi, H. T. AU - Ndjeya, S. PY - 2018 DA - 2018// TI - Improved cryptanalysis of rank metric schemes based on Gabidulin codes JO - Des Codes Cryptogr VL - 86 UR - https://doi.org/10.1007/s10623-017-0434-5 DO - 10.1007/s10623-017-0434-5 ID - Otmani2018 ER - TY - JOUR AU - Gaborit, P. AU - Zémor, G. PY - 2016 DA - 2016// TI - On the hardness of the decoding and the minimum distance problems for rank codes JO - IEEE Trans Inf Theory VL - 62 UR - https://doi.org/10.1109/TIT.2016.2616127 DO - 10.1109/TIT.2016.2616127 ID - Gaborit2016 ER - TY - JOUR AU - Bernstein, D. J. PY - 2010 DA - 2010// TI - Grover vs. mceliece. Post-Quantum Cryptography 2010 JO - Lecture Notes Comput Sci VL - 6061 UR - https://doi.org/10.1007/978-3-642-12929-2_6 DO - 10.1007/978-3-642-12929-2_6 ID - Bernstein2010 ER -