-
1
-
-
74049161040
-
-
Amazon.com. Amazon simple storage service (Amazon S3), 2009. Referenced 2009 at aws.amazon.com/s3.
-
Amazon.com. Amazon simple storage service (Amazon S3), 2009. Referenced 2009 at aws.amazon.com/s3.
-
-
-
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In 14th ACM CCS, pages 598-609, 2007.
-
(2007)
14th ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
CRYPTO, of
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In CRYPTO, volume 1666 of LNCS, pages 216-233, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
7
-
-
0038687710
-
Asynchronous verifiable secret sharing and proactive cryptosystems
-
C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. In 9th ACM CCS, pages 88-97, 2002.
-
(2002)
9th ACM CCS
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
8
-
-
33749418149
-
Asynchronous verifiable information dispersal
-
C. Cachin and S. Tessaro. Asynchronous verifiable information dispersal. In 24th IEEE SRDS, pages 191-202, 2005.
-
(2005)
24th IEEE SRDS
, pp. 191-202
-
-
Cachin, C.1
Tessaro, S.2
-
11
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese. MR-PDP: Multiple-replica provable data possession. In 28th IEEE ICDCS, pages 411-420, 2008.
-
(2008)
28th IEEE ICDCS
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
12
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
6th IACR TCC, of
-
Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In 6th IACR TCC, volume 5444 of LNCS, pages 109-127, 2009.
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
84942512232
-
SQUARE HASH: Fast message authentication via optimized universal hash functions
-
CRYPTO, of
-
M. Etzel, S. Patel, and Z. Ramzan. SQUARE HASH: Fast message authentication via optimized universal hash functions. In CRYPTO, volume 1666 of LNCS, pages 234-251, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 234-251
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
15
-
-
74049115688
-
-
D.L.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer, 2006. IACR eArchive 2006/150.
-
D.L.G. Filho and P.S.L.M. Barreto. Demonstrating data possession and uncheatable data transfer, 2006. IACR eArchive 2006/150.
-
-
-
-
16
-
-
0012577752
-
Secure distributed storage and retrieval
-
J. A. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed storage and retrieval. Theoretical Computer Science, 243(1-2):363-389, 2000.
-
(2000)
Theoretical Computer Science
, vol.243
, Issue.1-2
, pp. 363-389
-
-
Garay, J.A.1
Gennaro, R.2
Jutla, C.3
Rabin, T.4
-
17
-
-
4544293523
-
Efficient byzantine-tolerant erasure-coded storage
-
G. R. Goodson, J. J. Wylie, G. R. Ganger, and M. K. Reiter. Efficient byzantine-tolerant erasure-coded storage. In 34th IEEE DSN, pages 135-144, 2004.
-
(2004)
34th IEEE DSN
, pp. 135-144
-
-
Goodson, G.R.1
Wylie, J.J.2
Ganger, G.R.3
Reiter, M.K.4
-
18
-
-
74049094179
-
-
P. Gopalan, R.J. Lipton, and Y.Z. Ding. Error correction against computationally bounded adversaries, 2004. Manuscript.
-
P. Gopalan, R.J. Lipton, and Y.Z. Ding. Error correction against computationally bounded adversaries, 2004. Manuscript.
-
-
-
-
19
-
-
84942522751
-
MMH: Software message authentication in the Gbit/second rates
-
Fast Software Encryption, of
-
S. Halevi and H. Krawczyk. MMH: Software message authentication in the Gbit/second rates. In Fast Software Encryption, volume 1267 of LNCS, pages 172-189, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
21
-
-
0030646698
-
Proactive public key and signature systems
-
A. Herzberg, M. Jakobsson, H. Krawczyk, and M. Yung. Proactive public key and signature systems. In 4th ACM CCS, pages 100-110, 1997.
-
(1997)
4th ACM CCS
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Krawczyk, H.3
Yung, M.4
-
22
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
CRYPTO, of
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing, or: How to cope with perpetual leakage. In CRYPTO, volume 1963 of LNCS, pages 339-352, 1995.
-
(1995)
LNCS
, vol.1963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
23
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels and B. Kaliski. PORs: Proofs of retrievability for large files. In 14th ACM CCS, pages 584-597, 2007.
-
(2007)
14th ACM CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.2
-
24
-
-
84991939136
-
LFSR-based hashing and authentication
-
CRYPTO, of
-
H. Krawczyk. LFSR-based hashing and authentication. In CRYPTO, volume 839 of LNCS, pages 129-139, 1994.
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
25
-
-
85077532807
-
A cooperative Internet backup scheme
-
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative Internet backup scheme. In USENIX Annual Technical Conference, pages 29-41, 2003.
-
(2003)
USENIX Annual Technical Conference
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
26
-
-
24144474940
-
-
S. Micali, C. Peikert, M. Sudan, and D. Wilson. Optimal error correction against computationally bounded noise. In TCC, pages 1-16.
-
S. Micali, C. Peikert, M. Sudan, and D. Wilson. Optimal error correction against computationally bounded noise. In TCC, pages 1-16.
-
-
-
-
27
-
-
33748605569
-
The complexity of online memory checking
-
M. Naor and G. N. Rothblum. The complexity of online memory checking. In 46th IEEE FOCS, pages 573-584, 2005.
-
(2005)
46th IEEE FOCS
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.N.2
-
28
-
-
84957663269
-
Software performance of universal hash functions
-
EUROCRYPT, of
-
W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In EUROCRYPT, volume 1233 of LNCS, pages 24-41, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 24-41
-
-
Nevelsteen, W.1
Preneel, B.2
-
29
-
-
85077327800
-
A performance evaluation and examination of open-source erasure coding libraries for storage
-
J. S. Plank, J. Luo, C. D. Schuman, L. Xu, and Z. W. O'Hearn. A performance evaluation and examination of open-source erasure coding libraries for storage. In 7th USENIX FAST, pages 253-265, 2009.
-
(2009)
7th USENIX FAST
, pp. 253-265
-
-
Plank, J.S.1
Luo, J.2
Schuman, C.D.3
Xu, L.4
O'Hearn, Z.W.5
-
30
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
CRYPTO, of
-
P. Rogaway. Bucket hashing and its application to fast message authentication. In CRYPTO, volume 963 of LNCS, pages 29-42, 1995.
-
(1995)
LNCS
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
31
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
T. J. E. Schwarz and E. L. Miller. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In 26th IEEE ICDCS, page 12, 2006.
-
(2006)
26th IEEE ICDCS
, pp. 12
-
-
Schwarz, T.J.E.1
Miller, E.L.2
-
32
-
-
58349118819
-
Compact proofs of retrievability
-
ASIACRYPT, of
-
H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT, volume 5350 of LNCS, pages 90-107, 2008.
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
33
-
-
85016272824
-
Auditing to keep online storage services honest
-
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan. Auditing to keep online storage services honest. In 11th USENIX HotOS, pages 1-6, 2007.
-
(2007)
11th USENIX HotOS
, pp. 1-6
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
34
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
CRYPTO, of
-
V. Shoup. On fast and provably secure message authentication based on universal hashing. In CRYPTO, volume 1109 of LNCS, pages 313-328, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
35
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciencies, 22(3):265-279, 1981.
-
(1981)
Journal of Computer and System Sciencies
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
|