{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T13:23:47Z","timestamp":1748352227016,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/icoin.2015.7057954","type":"proceedings-article","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T16:58:20Z","timestamp":1426265900000},"page":"493-497","source":"Crossref","is-referenced-by-count":23,"title":["Homomorphic encryption in mobile multi cloud computing"],"prefix":"10.1109","author":[{"given":"Maya","family":"Louk","sequence":"first","affiliation":[]},{"given":"Hyotaek","family":"Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"InformationWeek","article-title":"6 Reasons to Use multiple cloud providers","year":"2012","key":"ref10"},{"journal-title":"New Encryption Method Promises End-to-End Cloud Security","article-title":"GCN Technology, Tools and Tactics for Public Sector IT","year":"2013","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1016\/j.future.2012.08.003","article-title":"Towards secure mobile cloud computing: A survey","volume":"29","author":"abdul nasir","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"ref13","article-title":"MCDB: Using Multi-clouds to Ensure Security in Cloud Computing","author":"mohammed abdullatif","year":"2011","journal-title":"Dependable Autonomic and Secure Computing (DASC) 2011 IEEE Ninth International Conference On IEEE"},{"key":"ref14","article-title":"Privacy-preserving public auditing for data storage security in cloud computing","author":"cong","year":"2010","journal-title":"INFOCOM 2010 Proceedings IEEE IEEE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588290"},{"article-title":"Data Security in Cloud based on Trusted Computing Environment","year":"0","author":"rama mohan","key":"ref17"},{"key":"ref18","article-title":"Towards trusted cloud computing","author":"nuno","year":"2009","journal-title":"Proceedings of the 2009 Conference on Hot Topics in Cloud Computing"},{"key":"ref19","article-title":"Towards practical program execution over fully homomorphic encryption schemes","author":"simon","year":"2013","journal-title":"P2P Parallel Grid Cloud and Internet Computing (3PGCIC) 2013 Eighth International Conference On IEEE"},{"key":"ref4","article-title":"Can homomorphic encryption be practical?","author":"michael","year":"2011","journal-title":"Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop ACM"},{"key":"ref3","article-title":"Cloud computing security: from single to multi-clouds","author":"mohammed abdullatif","year":"2012","journal-title":"System Science (HICSS) 2012 45th Hawaii International Conference on IEEE"},{"key":"ref6","article-title":"A Multi-token Authorization Strategy for Secure Mobile Cloud Computing","author":"azeem","year":"2014","journal-title":"Mobile Cloud Computing Services and Engineering (MobileCloud) 2014 2nd IEEE International Conference on IEEE"},{"key":"ref5","first-page":"369","article-title":"Heterogeneity in mobile cloud computing: taxonomy and open challenges","volume":"1","author":"zohreh","year":"2014","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref8","article-title":"Fully homomorphic encryption using ideal lattices","volume":"9","author":"craig","year":"0","journal-title":"STOC"},{"key":"ref7","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009","journal-title":"Stanford University"},{"key":"ref2","article-title":"Security Analysis of Cloud Computing","volume":"6849","author":"carlson","year":"2014","journal-title":"arXiv preprint arXiv 1404"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.6"},{"key":"ref9","article-title":"Can homomorphic encryption be practical?","author":"michael","year":"2011","journal-title":"Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop ACM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_6"},{"key":"ref22","first-page":"832","article-title":"Supporting Database Applications as a Service","author":"mei","year":"2009","journal-title":"ICDE'09 Proc 25th Intl Conf on Data Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.252"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"key":"ref23","first-page":"1","article-title":"Ensuring data storage security in cloud computing","author":"wang","year":"2010","journal-title":"ARTCOM'10 Proc Intl Conf on Advances in Recent Technologies in Communication and Computing"}],"event":{"name":"2015 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2015,1,12]]},"location":"Cambodia","end":{"date-parts":[[2015,1,14]]}},"container-title":["2015 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7051394\/7057846\/07057954.pdf?arnumber=7057954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T03:19:50Z","timestamp":1498187990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7057954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icoin.2015.7057954","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}