Downloads provided by UsageCounts
{"references": ["1.\t\u0428\u0430\u043d\u044c\u0433\u0438\u043d, \u0412. \u0424. \u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u0441\u0435\u0442\u0435\u0439 : \u0443\u0447\u0435\u0431. \u043f\u043e\u0441\u043e\u0431\u0438\u0435 / \u0412.\u0424. \u0428\u0430\u043d\u044c\u0433\u0438\u043d. \u2014 \u041c\u043e\u0441\u043a\u0432\u0430 : \u0418\u0414 \u00ab\u0424\u041e\u0420\u0423\u041c\u00bb : \u0418\u041d\u0424\u0420\u0410-\u041c, 2017. \u2014 416 \u0441. 2.\t\u0410\u043a\u0431\u0430\u0440\u043e\u0432 \u0414.\u0415. \u0410\u0445\u0431\u043e\u0440\u043e\u0442 \u0445\u0430\u0432\u0444\u0441\u0438\u0437\u043b\u0438\u0433\u0438\u043d\u0438 \u0442\u0430\u044a\u043c\u0438\u043d\u043b\u0430\u0448\u043d\u0438\u043d\u0433 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u043a \u0443\u0441\u0443\u043b\u043b\u0430\u0440\u0438 \u0432\u0430 \u0443\u043b\u0430\u0440\u043d\u0438\u043d\u0433 \u049b\u045e\u043b\u043b\u0430\u043d\u0438\u043b\u0438\u0448\u0438 // \u0422\u043e\u0448\u043a\u0435\u043d\u0442, 2008, -\u0411. - 394. 3.\t\u0425\u0430\u0441\u0430\u043d\u043e\u0432 \u041f.\u0424., \u0425\u0430\u0441\u0430\u043d\u043e\u0432 \u0425.\u041f., \u0410\u0445\u043c\u0435\u0434\u043e\u0432\u0430 \u041e.\u041f., \u0414\u0430\u0432\u043b\u0430\u0442\u043e\u0432 \u0410.\u0411. \"\u041a\u0440\u0438\u043f\u0442\u043e\u0442\u0430\u04b3\u043b\u0438\u043b \u0432\u0430 \u0443\u043d\u0438\u043d\u0433 \u043c\u0430\u0445\u0441\u0443\u0441 \u0443\u0441\u0443\u043b\u043b\u0430\u0440\u0438\" \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d \u045e\u049b\u0443\u0432 \u049b\u045e\u043b\u043b\u0430\u043d\u043c\u0430. 2010 \u0439. 4.\t\u0410\u043a\u0431\u0430\u0440\u043e\u0432 \u0414.\u0415., \u0425\u0430\u0441\u0430\u043d\u043e\u0432 \u041f.\u0424., \u0425\u0430\u0441\u0430\u043d\u043e\u0432 \u0425.\u041f., \u0410\u0445\u043c\u0435\u0434\u043e\u0432\u0430 \u041e.\u041f. \"\u041a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u044f\u043d\u0438\u043d\u0433 \u043c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u043a \u0430\u0441\u043e\u0441\u043b\u0430\u0440\u0438\" \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d \u045e\u049b\u0443\u0432 \u049b\u045e\u043b\u043b\u0430\u043d\u043c\u0430. 2010 \u0439. 5.\t\u0421.\u041a.\u0413\u0430\u043d\u0438\u0435\u0432, \u041c.\u041c.\u041a\u0430\u0440\u0438\u043c\u043e\u0432, \u0417.\u0422.\u0425\u0443\u0434\u043e\u0439\u049b\u0443\u043b\u043e\u0432, \u041c.\u041c.\u041a\u0430\u0434\u0438\u0440\u043e\u0432. \u0422\u043e\u043b\u043a\u043e\u0432\u044b\u0439 \u0441\u043b\u043e\u0432\u0430\u0440\u044c \u0442\u0435\u0440\u043c\u0438\u043d\u043e\u0432 \u0438 \u043f\u043e\u043d\u044f\u0442\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u0440\u0443\u0441\u0441\u043a\u043e\u043c, \u0443\u0437\u0431\u0435\u043a\u0441\u043a\u043e\u043c \u0438 \u0430\u043d\u0433\u043b\u0438\u0439\u0441\u043a\u043e\u043c \u044f\u0437\u044b\u043a\u0430\u0445. \u2013\u0422.: \u00ab\u0418\u049b\u0442\u0438\u0441\u043e\u0434-\u043c\u043e\u043b\u0438\u044f\u00bb, - 2017, 480 \u0441. 6.\t\u0421.\u041a.\u0413\u0430\u043d\u0438\u0435\u0432, \u041c.\u041c.\u041a\u0430\u0440\u0438\u043c\u043e\u0432, \u041a.\u0410.\u0422\u0430\u0448\u0435\u0432. \u0410\u0445\u0431\u043e\u0440\u043e\u0442 \u0445\u0430\u0432\u0444\u0441\u0438\u0437\u043b\u0438\u0433\u0438. \u2013\u0422.: \u00ab\u0424\u0430\u043d \u0432\u0430 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f\u00bb, 2016, 372 \u0431\u0435\u0442. 7.\tMersaid A., Gulom T. The encryption algorithm AES-RFWKIDEA32-1 based on network RFWKIDEA32-1 //International Journal of Electronics and Information Engineering. \u2013 2016. \u2013 \u0422. 4. \u2013 \u2116. 1. \u2013 \u0421. 1-11. 8.\tDejamfar S. M., Najafzadeh S. Authentication Techniques in Cloud Computing: A Review //International Journal of Advanced Research in Computer Science and Software Engineering. \u2013 2017. \u2013 \u0422. 7. \u2013 \u2116. 1. 9.\tMell P. et al. The NIST definition of cloud computing. \u2013 2011. 10.\tLeila M., Abdelhafid Z., Mahieddine D. A New Framework of Authentication Over Cloud Computing //Proceedings of the Computational Methods in Systems and Software. \u2013 Springer, Cham, 2017. \u2013 \u0421. 262-270. 11.\tPatel K., Alabisi A. Cloud Computing Security Risks: Identification and Assessment //The Journal of New Business Ideas & Trends. \u2013 2019. \u2013 \u0422. 17. \u2013 \u2116. 2. \u2013 \u0421. 11-19. 12.\tTanash R. M., Ala'F K., Darabkh K. A. Communication over Cloud Computing: A Security Survey //2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). \u2013 IEEE, 2019. \u2013 \u0421. 496-501. 13.\tRizwan S., Zubair M. Basic Security Challenges in Cloud Computing //2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST). \u2013 IEEE, 2019. \u2013 \u0421. 1-4. 14.\tAl_Janabi S., Hussein N. Y. The reality and future of the secure mobile cloud computing (SMCC): survey //International Conference on Big Data and Networks Technologies. \u2013 Springer, Cham, 2019. \u2013 \u0421. 231-261. 15.\t Information Supplement: PCI SSC Cloud Computing Guidelines. Cloud Special Interest Group PCI Security Standards Council. April 2018. https://www.pcisecuritystandards.org/pdfs/PCI_SSC_Cloud_Guidelines_v3.pdf 16.\t Siyakha N. Mthunzi, Elhadj Benkhelifa, Tomasz Bosakowski, Chirine Ghedira Guegan, Mahmoud Barhamgi, Cloud computing security taxonomy: From an atomistic to a holistic view, Future Generation Computer Systems, Volume 107, 2020, Pages 620-644. 17.\t Ashish Singh and Kakali Chatterjee, Cloud security issues and challenges: a survey, Journal of Network and Computer Applications http://dx.doi.org/10.1016/j.jnca.2016.11.027 18.\t Hubbard D, Sutton M. Top threats to cloud computing v1. 0. Cloud Security Alliance. 2010 Mar. 19.\tHong J. B. et al. Systematic identification of threats in the cloud: A survey //Computer Networks. \u2013 2019. \u2013 \u0422. 150. \u2013 \u0421. 46-69. 20.\tRamachandra G., Iftikhar M., Khan F. A. A comprehensive survey on security in cloud computing //Procedia Computer Science. \u2013 2017. \u2013 \u0422. 110. \u2013 \u0421. 465-472. 21.\tKhan M. A. A survey of security issues for cloud computing //Journal of network and computer applications. \u2013 2016. \u2013 \u0422. 71. \u2013 \u0421. 11-29. 22.\tAbdurachman E. et al. Survey on Threats and Risks in the Cloud Computing Environment //Procedia Computer Science. \u2013 2019. \u2013 \u0422. 161. \u2013 \u0421. 1325-1332. 23.\tLim S. Y., Kiah M. L. M., Ang T. F. Security Issues and Future Challenges of Cloud Service Authentication //Acta Polytechnica Hungarica. \u2013 2017. \u2013 \u0422. 14. \u2013 \u2116. 2. \u2013 \u0421. 69-89. 24.\tSood SK. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications. 2012 Nov30; 35(6): pp. 1831-1838. 25.\t Tang Y, Lee PP, Lui J, Perlman R. Secure overlay cloud storage with access control and assured deletion. Dependable and Secure Computing, IEEE Transactions on. 2012 Nov; 9(6): pp. 903-916. 26.\tWei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV. Security and privacy for storage and computation in cloud computing. Information Sciences. 2014 Feb 10; 258:371-86. 27.\t Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. InAdvances in CryptologyCRYPTO 2010 2010 Jan 1 (pp. 465-482). Springer Berlin Heidelberg. 28.\t Li S, Sadeghi AR, Heisrath S, Schmitz R, Ahmad JJ. hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers. InFinancial Cryptography and Data Security 2012 Jan 1 (pp. 235-249). Springer Berlin Heidelberg. 29.\t Wang C, Wang Q, Ren K, Cao N, Lou W. Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions on. 2012 Apr;5(2):220-32. 30.\t J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun and Y. Xiang, \"Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing,\" in IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 996-1010, 1 Nov.-Dec. 2019. 31.\t J. Xiong et al., \"A Secure Data Self-Destructing Scheme in Cloud Computing,\" in IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 448-458, 1 Oct.-Dec. 2014. 32.\t P. Mishra, K. Khurana, S. Gupta and M. K. Sharma, \"VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud,\" 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 2019, pp. 1-6. 33.\t S. Muthurajkumar, M. Vijayalakshmi, S. Ganapathy and A. Kannan, \"Agent based intelligent approach for the malware detection for infected cloud data storage files,\" 2015 Seventh International Conference on Advanced Computing (ICoAC), Chennai, 2015, pp. 1-5. 34.\t J. Darrous, S. Ibrahim, A. C. Zhou and C. Perez, \"Nitro: Network-Aware Virtual Machine Image Management in Geo-Distributed Clouds,\" 2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Washington, DC, 2018, pp. 553-562. 35.\t H. Liu, B. He, X. Liao and H. Jin, \"Towards Declarative and Data-Centric Virtual Machine Image Management in IaaS Clouds,\" in IEEE Transactions on Cloud Computing, vol. 7, no. 4, pp. 1124-1138, 1 Oct.-Dec. 2019. 36.\t S. M. Neamul Islam and M. Rahman, \"Securing virtual machine images of cloud by encryption through Kerberos,\" 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, 2017, pp. 1074-1079. 37.\t X. Yue, L. Xiao, W. Zhan, Z. Xu, L. Ruan and R. Liu, \"An Optimized Approach to Protect Virtual Machine Image Integrity in Cloud Computing,\" 2016 7th International Conference on Cloud Computing and Big Data (CCBD), Macau, 2016, pp. 75-80. 38.\t F. Zhang, J. Wang, K. Sun and A. Stavrou, \"HyperCheck: A Hardware-AssistedIntegrity Monitor,\" in IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 4, pp. 332-344, July-Aug. 2014. 39.\t Wu C, Wang Z, Jiang X. Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. InNDSS 2013 Feb. 40.\t Li C, Raghunathan A, Jha NK. A trusted virtual machine in an untrusted management environment. Services Computing, IEEE Transactions on. 2012 Sep 1;5(4): pp. 472-483."]}
Ушбу мақола мақсади булутли ҳисоблаш тизимларида, эллиптик эгри чизиққа, биргина фойдаланишли аутентификация тизими учун ишлаб чиқилган усуллар ва алгоритмлардан олинган реал ҳамда тажрибавий таҳлиллар билан изоҳланади. Мақола натижаларининг илмий аҳамияти булутли ҳисоблаш тизимларида, эллиптик эгри чизиққа, биргина фойдаланишли аутентификация тизими учун усул ва алгоритмларни ишлаб чиқиш ва такомиллаштириш билан изоҳланади. Булутли ҳисоблаш тизимларида фойдаланувчиларни ҳақиқийлигини тасдиқлашга қаратилган таҳдидларни камайтириш ва кўп сонли қайд ёзувлар учун аутентификация жараёнини ягона парол асосида амалга ошириш имконияти билан изоҳланади.
эллиптик эгри чизиқ, скаляр қиймат, паролни алмаштириш.
эллиптик эгри чизиқ, скаляр қиймат, паролни алмаштириш.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 29 | |
| downloads | 25 |

Views provided by UsageCounts
Downloads provided by UsageCounts