-
1
-
-
0003415652
-
The Design and Analysis of Computer Algorithms
-
Addison Wesley, Reading
-
Aho, A.V., Hopcroft, J.E., Ullman, J.D.: The Design and Analysis of Computer Algorithms. Addison-Wesley Series in Computer Science and Information Processing. Addison Wesley, Reading (1974)
-
(1974)
Addison-Wesley Series in Computer Science and Information Processing
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
2
-
-
0036039958
-
The invasiveness of off-line memory checking
-
Ajtai, M.: The invasiveness of off-line memory checking. In: STOC, pp. 504-513 (2002)
-
(2002)
STOC
, pp. 504-513
-
-
Ajtai, M.1
-
4
-
-
60349119580
-
Provable data possession at untrusted stores. Cryptology ePrint Archive
-
Report 2007/202
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. Cryptology ePrint Archive, Report 2007/202 (2007)
-
(2007)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
0028482823
-
Checking the correctness of memories
-
Blum, M., Evans, W.S., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. Algorithmica 12(2/3), 225-244 (1994)
-
(1994)
Algorithmica
, vol.12
, Issue.2-3
, pp. 225-244
-
-
Blum, M.1
Evans, W.S.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
8
-
-
27544456041
-
Towards constant bandwidth overhead integrity checking of untrusted data
-
Clarke, D.E., Suh, G.E., Gassend, B., Sudan, A., van Dijk, M., Devadas, S.: Towards constant bandwidth overhead integrity checking of untrusted data. In: IEEE Symposium on Security and Privacy, pp. 139-153 (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 139-153
-
-
Clarke, D.E.1
Suh, G.E.2
Gassend, B.3
Sudan, A.4
van Dijk, M.5
Devadas, S.6
-
9
-
-
84869639669
-
-
Cox, R.: http://research.swtch.com/2008/03/ using-uninitialized-memory- for-fun-and.html
-
-
-
Cox, R.1
-
12
-
-
0022793132
-
How to construct pseudorandom functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct pseudorandom functions. Journal of the ACM 33(2), 792-807 (1986)
-
(1986)
Journal of the ACM
, vol.33
, Issue.2
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
Naor, J., Naor, M.: Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput. 22(4), 838-856 (1993)
-
(1993)
SIAM J. Comput
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
15
-
-
33748605569
-
The complexity of online memory checking
-
Naor, M., Rothblum, G.N.: The complexity of online memory checking. In: FOCS, pp. 573-584 (2005)
-
(2005)
FOCS
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.N.2
-
16
-
-
38149124657
-
Integrity checking in cryptographic file systems with constant trusted storage
-
Oprea, A., Reiter, M.K.: Integrity checking in cryptographic file systems with constant trusted storage. In: USENIX Security Symposium (2007)
-
(2007)
USENIX Security Symposium
-
-
Oprea, A.1
Reiter, M.K.2
-
17
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J, ed, ASIACRYPT 2008, Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
|