메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 223-237

Remote integrity check with dishonest storage server

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS;

EID: 57049134700     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_15     Document Type: Conference Paper
Times cited : (88)

References (15)
  • 1
    • 13644274213 scopus 로고    scopus 로고
    • A survey of peer-to-peer content distribution technologies
    • Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv. 36(4), 335-371 (2004)
    • (2004) ACM Comput. Surv , vol.36 , Issue.4 , pp. 335-371
    • Androutsellis-Theotokis, S.1    Spinellis, D.2
  • 5
    • 57049120189 scopus 로고    scopus 로고
    • Proofs of retrievability: Theory and implementation. Cryptology ePrint Archive
    • Report 2008/175
    • Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. Cryptology ePrint Archive, Report 2008/175 (2008)
    • (2008)
    • Bowers, K.D.1    Juels, A.2    Oprea, A.3
  • 6
    • 57049140469 scopus 로고    scopus 로고
    • Chang, E.-C., Mukhopadhyay, S., Xu, J.: Remote integrity check without the original. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, 4622, p. 2007. Springer. Heidelberg (manuscript submitted. 2007), http://www.comp.nus.edu.sg/ ~changec/publications/remote.pdf
    • Chang, E.-C., Mukhopadhyay, S., Xu, J.: Remote integrity check without the original. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, p. 2007. Springer. Heidelberg (manuscript submitted. 2007), http://www.comp.nus.edu.sg/ ~changec/publications/remote.pdf
  • 7
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive
    • Report 2006/150
    • Filho, D., Barreto, P.: Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150 (2006)
    • (2006)
    • Filho, D.1    Barreto, P.2
  • 9
    • 84944905011 scopus 로고    scopus 로고
    • Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, 2271, pp. 244-262. Springer, Heidelberg (2002)
    • Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244-262. Springer, Heidelberg (2002)
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
    • 57049174560 scopus 로고    scopus 로고
    • Compact proofs of retrievability. Cryptology ePrint Archive
    • Report 2008/073
    • Shacham, H., Waters, B.: Compact proofs of retrievability. Cryptology ePrint Archive, Report 2008/073 (2008). http://eprint.iacr.org/
    • (2008)
    • Shacham, H.1    Waters, B.2
  • 15
    • 84944412608 scopus 로고    scopus 로고
    • Suh, G.E., Clarke, D., Gasend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: IEEE/ACM Int. Sym. on Microarchitecture, pp. 339-350 (2003)
    • Suh, G.E., Clarke, D., Gasend, B., van Dijk, M., Devadas, S.: Efficient memory integrity verification and encryption for secure processors. In: IEEE/ACM Int. Sym. on Microarchitecture, pp. 339-350 (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.