{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:36:30Z","timestamp":1729640190803,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isspit.2014.7300603","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T18:19:44Z","timestamp":1445883584000},"page":"000296-000300","source":"Crossref","is-referenced-by-count":2,"title":["Towards an augmented authenticator in the Cloud"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Pitropakis","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Yfantopoulos","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Geneiatakis","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"213","author":"ferguson","year":"0","journal-title":"Improved Cryptanalysis of Rijndael Fast Software Encryption"},{"key":"ref38","article-title":"New Attack on AES","volume":"8","author":"bruce","year":"2010","journal-title":"Schneier on Security A blog covering security and security technology Archived from the original on"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3375","DOI":"10.1007\/s10916-012-9830-6","article-title":"A secure EHR system based on hybrid clouds","volume":"36","author":"yu-yi","year":"2012","journal-title":"Journal of Medical Systems"},{"year":"0","key":"ref32","article-title":"WS02 Identity server"},{"key":"ref31","article-title":"Securing the e-health cloud","author":"hans","year":"2010","journal-title":"Proceedings of the 1 st ACM International Health Informatics Symposium"},{"key":"ref30","article-title":"A Security Assessment of Trusted Platform Modules Computer Science Technical Report TR2007&#x2013;597","author":"sparks","year":"2007","journal-title":"Department of Computer Science - Dartmouth College Technical Report TR536"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","author":"bogdanov","year":"2011","journal-title":"Biclique cryptanalysis of the full AES In Advances in Cryptology-ASIACRYPT 2011"},{"key":"ref36","article-title":"Efficiency of Corporate Security Systems in Managing Information Threats: An Overview of the Current Situation","volume":"16","author":"kaja","year":"2014","journal-title":"Varstvoslovje Journal of Criminal Justice and Security"},{"key":"ref35","article-title":"ENISA Threat Landscape 2013","volume":"10","author":"marinos","year":"2013","journal-title":"Heraklion European Union Agency for Network and Information Security (ENISA)"},{"key":"ref34","article-title":"Security models and requirements for healthcare application clouds","author":"rui","year":"2010","journal-title":"Cloud Computing (CLOUD) 2010 IEEE 3rd International Conference on IEEE"},{"key":"ref10","article-title":"Thwarting audio steganography attacks in cloud storage systems","author":"bo","year":"2011","journal-title":"Cloud and Service Computing (CSC) 2011"},{"key":"ref11","article-title":"Enhancement of Security for Data Storage in Cloud","author":"hemaanand","year":"2013","journal-title":"International Journal"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"journal-title":"Productions MPEG Audio Layer III Encoders","year":"0","key":"ref13"},{"article-title":"mp3stego","year":"0","author":"petitcolas","key":"ref14"},{"year":"2001","key":"ref15","article-title":"Announcing the ADVANCED ENCRYPTION STANDARD (AES)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36415-3_21"},{"article-title":"Dissappearing Cryptography Information Hiding: Steganography & Watermarking","year":"0","author":"wayner","key":"ref17"},{"key":"ref18","article-title":"A practical design of high-volume steganography in digital video files","volume":"19","author":"su","year":"2011"},{"year":"0","key":"ref19","article-title":"Invisible Secrets 4"},{"key":"ref28","article-title":"Bootstrapping trust in a &#x201C;trusted&#x201D; platform","author":"parno","year":"0","journal-title":"HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security available at"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.31"},{"key":"ref27","first-page":"1","article-title":"Towards HIPAA-Compliant Healthcare Systems in Cloud Computing","volume":"2","author":"ruoyu","year":"2012","journal-title":"International Journal of Computational Models and Algorithms in Medicine"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","article-title":"A privacy manager for cloud computing","author":"pearson","year":"2009","journal-title":"Cloud Computing Springer Berlin Heidelberg"},{"key":"ref6","first-page":"1","article-title":"Digital Watermarking and Steganography","author":"miller","year":"0","journal-title":"Morgan Kaufmann"},{"key":"ref29","article-title":"Analyzing trusted platform communication","author":"klaus","year":"2005","journal-title":"ECRYPT Workshop CRASH Cryptographic Advances in Secure Hardware"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1542207.1542239"},{"key":"ref8","first-page":"2278","article-title":"Cloud computing security with Steganography and Cryptoghrapy AES algorthm Technology","author":"wawge","year":"2012","journal-title":"World Research Journal of Computer Architecture ISSN"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.39"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2011.5766466"},{"article-title":"A Survey on various patterns regarding Encryption, a efficient based Method Regarding Cryptography and Steganography","year":"0","author":"mahale","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.13"},{"year":"0","author":"machado","key":"ref20"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"year":"0","key":"ref24","article-title":"cypto++"},{"journal-title":"JPHIDE and JPSEEK","year":"0","author":"cox","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2014,12,15]]},"location":"Noida, India","end":{"date-parts":[[2014,12,17]]}},"container-title":["2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7277353\/7300553\/07300603.pdf?arnumber=7300603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T20:20:26Z","timestamp":1567282826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7300603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/isspit.2014.7300603","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}