-
1
-
-
0003900671
-
-
RFC 3161, Internet Engineering Task Force, August
-
C. Adams, P. Cain, D. Pinkas, and R. Zuccherato. Internet X.509 public key infrastructure Time-Stamp protocol (TSP). RFC 3161, Internet Engineering Task Force, August 2001.
-
(2001)
Internet X.509 public key infrastructure Time-Stamp protocol (TSP)
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
2
-
-
70349245972
-
-
R. Anderson. The eternity service. In J. P?ribyl, editor, Proceedings of Pragocrypt '96, pages 242-252, Prague, 1996. Czech Technical University Publishing House.
-
R. Anderson. The eternity service. In J. P?ribyl, editor, Proceedings of Pragocrypt '96, pages 242-252, Prague, 1996. Czech Technical University Publishing House.
-
-
-
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
S. De Capitani di Vimercati and P. Syverson, editors, New York, NY, USA, October, ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In S. De Capitani di Vimercati and P. Syverson, editors, CCS'07: Proceedings of the 14th ACM conference on Computer and communications security, pages 598-609, New York, NY, USA, October 2007. ACM.
-
(2007)
CCS'07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
70349234989
-
Why traditional storage systems don't help us save stuff forever
-
Yokohama, Japan, June, IEEE Computer Society Press
-
M. Baker, K. Leaton, and S. Martin. Why traditional storage systems don't help us save stuff forever. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 1st Workshop on Hot Topics in System Dependability (HotDep-05), Yokohama, Japan, June 2005. IEEE Computer Society Press.
-
(2005)
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 1st Workshop on Hot Topics in System Dependability (HotDep-05)
-
-
Baker, M.1
Leaton, K.2
Martin, S.3
-
5
-
-
34748917584
-
A fresh look at the reliability of long-term digital storage
-
M. Baker, M. Shah, D. S. H. Rosenthal, M. Roussopoulos, P. Maniatis, TJ Giuli, and P. Bungale. A fresh look at the reliability of long-term digital storage. SIGOPS Oper. Syst. Rev., 40(4):221-234, 2006.
-
(2006)
SIGOPS Oper. Syst. Rev
, vol.40
, Issue.4
, pp. 221-234
-
-
Baker, M.1
Shah, M.2
Rosenthal, D.S.H.3
Roussopoulos, M.4
Maniatis, P.5
Giuli, T.J.6
Bungale, P.7
-
7
-
-
11144284140
-
Implementing trustworthy internet based long term electronic preservation service - the eKeeper project
-
M. H. Hamza, editor, Internet, and Information Technology
-
A. Jerman Blazic and B. Dzonova-Jerman-Blazic. Implementing trustworthy internet based long term electronic preservation service - the eKeeper project. In M. H. Hamza, editor, IASTED International Conference on Communications, Internet, and Information Technology, pages 291-296, 2004.
-
(2004)
IASTED International Conference on Communications
, pp. 291-296
-
-
Jerman Blazic, A.1
Dzonova-Jerman-Blazic, B.2
-
8
-
-
33646072783
-
Provision of long-term archiving service for digitally signed documents using an archive interaction protocol
-
D. W. Chadwick and G. Zhao, editors
-
A. Jerman Blazic and P. Sylvester. Provision of long-term archiving service for digitally signed documents using an archive interaction protocol. In D. W. Chadwick and G. Zhao, editors, EuroPKI, pages 240-254, 2005.
-
(2005)
EuroPKI
, pp. 240-254
-
-
Jerman Blazic, A.1
Sylvester, P.2
-
10
-
-
35048871887
-
Using secret sharing for searching in encrypted data
-
W. Jonker and M. Petkovic, editors, Secure Data Management, of, Springer
-
R. Brinkman, J. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In W. Jonker and M. Petkovic, editors, Secure Data Management, volume 3178 of Lecture Notes in Computer Science, pages 18-27. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3178
, pp. 18-27
-
-
Brinkman, R.1
Doumen, J.2
Jonker, W.3
-
11
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
B. Pfitzmann, editor, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, of, London, UK, Springer
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In B. Pfitzmann, editor, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 2045 of Lecture Notes in Computer Science, pages 93-118, London, UK, 2001. Springer.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
70349253583
-
-
C. Casten. The power of XAM. SNIA Data Management Forum
-
C. Casten. The power of XAM. SNIA Data Management Forum.
-
-
-
-
13
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28(10):1030-1044, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
15
-
-
38549123829
-
-
G. Danezis and C. Diaz. Space-efficient private search. In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007), 4886 of Lecture Notes in Computer Science, pages 148-162, Tobago, 2007. Springer-Verlag.
-
G. Danezis and C. Diaz. Space-efficient private search. In R. Dhamija and S. Dietrich, editors, Proceedings of Financial Cryptography (FC2007), volume 4886 of Lecture Notes in Computer Science, pages 148-162, Tobago, 2007. Springer-Verlag.
-
-
-
-
16
-
-
47249163309
-
The need for preservation aware storage: A position paper
-
M. Factor, D. Naor, S. Rabinovici-Cohen, L. Ramati, P. Reshef, and J. Satran. The need for preservation aware storage: a position paper. Operating Systems Review, 41(1):19-23, 2007.
-
(2007)
Operating Systems Review
, vol.41
, Issue.1
, pp. 19-23
-
-
Factor, M.1
Naor, D.2
Rabinovici-Cohen, S.3
Ramati, L.4
Reshef, P.5
Satran, J.6
-
17
-
-
47249152391
-
Preservation datastores: Architecture for preservation aware storage
-
M. Factor, D. Naor, S. Rabinovici-Cohen, L. Ramati, P. Reshef, J. Satran, and D. L. Giaretta. Preservation datastores: Architecture for preservation aware storage. In MSST, pages 3-15, 2007.
-
(2007)
MSST
, pp. 3-15
-
-
Factor, M.1
Naor, D.2
Rabinovici-Cohen, S.3
Ramati, L.4
Reshef, P.5
Satran, J.6
Giaretta, D.L.7
-
18
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
Technical report
-
D. G. Filho and P. Barreto. Demonstrating data possession and uncheatable data transfer. Technical report, 2006. http://eprint.iacr.org/.
-
(2006)
-
-
Filho, D.G.1
Barreto, P.2
-
20
-
-
70349245971
-
-
International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS), 2003.
-
International Organization for Standarization. ISO standard 14721:2003 space data and information transfer systems-a reference model for an open archival information system (OAIS), 2003.
-
-
-
-
21
-
-
84964528983
-
Survivable storage systems
-
Anaheim, CA, USA, June, IEEE CS Press
-
G. R. Ganger, P. K. Khosla, M. Bakkaloglu, M. W. Bigrigg, G. R. Goodson, S. Oguz, V. Pandurangan, C. A. N. Soules, J. D. Strunk, and J. J. Wylie. Survivable storage systems. In Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX), pages 184-195, Anaheim, CA, USA, June 2001. IEEE CS Press.
-
(2001)
Proceedings of the DARPA Information Survivability Conference & Exposition (DISCEX)
, pp. 184-195
-
-
Ganger, G.R.1
Khosla, P.K.2
Bakkaloglu, M.3
Bigrigg, M.W.4
Goodson, G.R.5
Oguz, S.6
Pandurangan, V.7
Soules, C.A.N.8
Strunk, J.D.9
Wylie, J.J.10
-
22
-
-
36049042299
-
A content integrity service for long-term digital archives
-
The Society for Imaging Science and Technology, May
-
S. Haber and P. Kamat. A content integrity service for long-term digital archives. In IS&T Archiving Conference (Archiving 2006), volume 3, pages 159-164. The Society for Imaging Science and Technology, May 2006.
-
(2006)
IS&T Archiving Conference (Archiving 2006)
, vol.3
, pp. 159-164
-
-
Haber, S.1
Kamat, P.2
-
23
-
-
0041291986
-
-
RFC 3280, Internet Engineering Task Force, April
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 3280, Internet Engineering Task Force, April 2002.
-
(2002)
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
24
-
-
70349231866
-
-
European Telecommunication Standard Institute. ETSI TS 101 903 - XML advanced electronic signatures (XAdES), 2002.
-
European Telecommunication Standard Institute. ETSI TS 101 903 - XML advanced electronic signatures (XAdES), 2002.
-
-
-
-
25
-
-
70349255202
-
-
ITU. ITU-T rec. X.509|ISO/IEC 9594-8: The directory: Authentication framework, 2000.
-
ITU. ITU-T rec. X.509|ISO/IEC 9594-8: The directory: Authentication framework, 2000.
-
-
-
-
26
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
S. De Capitani di Vimercati and P. Syverson, editors, New York, NY, USA, ACM
-
A. Juels and B. S. Kaliski. PORs: proofs of retrievability for large files. In S. De Capitani di Vimercati and P. Syverson, editors, ACM CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 584-597, New York, NY, USA, 2007. ACM.
-
(2007)
ACM CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
27
-
-
0024864204
-
Hyperelliptic cryptosystems
-
N. Koblitz. Hyperelliptic cryptosystems. Journal of Cryptology, 1(3):139-150, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 139-150
-
-
Koblitz, N.1
-
29
-
-
70349228802
-
-
RSA Laboratories. PKCS#1v2.1: RSA cryptography standard, June 2002.
-
RSA Laboratories. PKCS#1v2.1: RSA cryptography standard, June 2002.
-
-
-
-
30
-
-
53249137431
-
Key lengths
-
Information Warfare; Social, Legal and International Issues; and Security Foundations:617-635
-
A. Lenstra. Key lengths. Handbook of Information Security, Volume II: Information Warfare; Social, Legal and International Issues; and Security Foundations, Volume II: Information Warfare; Social, Legal and International Issues; and Security Foundations:617-635, 2006.
-
(2006)
Handbook of Information Security, Volume II: Information Warfare; Social, Legal and International Issues; and Security Foundations
, vol.2
-
-
Lenstra, A.1
-
31
-
-
85084162796
-
Enabling the archival storage of signed documents
-
P. Maniatis and M. Baker. Enabling the archival storage of signed documents. In FAST, pages 31-45, 2002.
-
(2002)
FAST
, pp. 31-45
-
-
Maniatis, P.1
Baker, M.2
-
33
-
-
16644392046
-
The LOCKSS peer-to-peer digital preservation system
-
P. Maniatis, M. Roussopoulos, T. J. Giuli, D. S. H. Rosenthal, and M. Baker. The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst., 23(1):2-50, 2005.
-
(2005)
ACM Trans. Comput. Syst
, vol.23
, Issue.1
, pp. 2-50
-
-
Maniatis, P.1
Roussopoulos, M.2
Giuli, T.J.3
Rosenthal, D.S.H.4
Baker, M.5
-
34
-
-
70349248961
-
27 billion gigabytes to be archived by 2010
-
December
-
J. McAdams. 27 billion gigabytes to be archived by 2010. Computerworld, December 2007.
-
(2007)
Computerworld
-
-
McAdams, J.1
-
35
-
-
0004192381
-
Handbook of Applied Cryptography
-
chapter 10, CRC Press, Inc, Boca Raton, FL, USA
-
A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography, chapter 10 - Identification and Entity Authentication, pages 385-424. CRC Press, Inc., Boca Raton, FL, USA, 1996.
-
(1996)
Identification and Entity Authentication
, pp. 385-424
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
36
-
-
0031696792
-
Cramming more components onto integrated circuits
-
G. E. Moore. Cramming more components onto integrated circuits. Proceedings of the IEEE, 86(1):82-85, 1998.
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.1
, pp. 82-85
-
-
Moore, G.E.1
-
37
-
-
0004115865
-
-
RFC 2560, Internet Engineering Task Force, June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. X.509 internet public key infrastructure online certificate status protocol - OCSP. RFC 2560, Internet Engineering Task Force, June 1999.
-
(1999)
X.509 internet public key infrastructure online certificate status protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
38
-
-
38049002436
-
A survey of single-database private information retrieval: Techniques and applications
-
T. Okamoto and X. Wang, editors, Public Key Cryptography, of, Springer-Verlag
-
R. Ostrovsky and W. E. Skeith III. A survey of single-database private information retrieval: Techniques and applications. In T. Okamoto and X. Wang, editors, Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, pages 393-411. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
39
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
40
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
70349228801
-
-
M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 143?U-156. USENIX, June 2007.
-
M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the 2007 USENIX Annual Technical Conference, pages 143?U-156. USENIX, June 2007.
-
-
-
-
44
-
-
0033652944
-
Preserving digital information forever
-
New York, NY, USA, ACM Press
-
A. Waugh, R. Wilkinson, B. Hills, and J. Dell'oro. Preserving digital information forever. In DL '00: Proceedings of the fifth ACM conference on Digital libraries, pages 175-184, New York, NY, USA, 2000. ACM Press.
-
(2000)
DL '00: Proceedings of the fifth ACM conference on Digital libraries
, pp. 175-184
-
-
Waugh, A.1
Wilkinson, R.2
Hills, B.3
Dell'oro, J.4
|