• Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...