-
1
-
-
84995514651
-
Privacy-enabling social networking over untrusted networks
-
Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Proc. WOSN 2009, pp. 1-6 (2009)
-
(2009)
Proc. WOSN 2009
, pp. 1-6
-
-
Anderson, J.1
Diaz, C.2
Bonneau, J.3
Stajano, F.4
-
2
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28 February
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Technical Report UCB/EECS-2009-28 (February 2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS 2007 (2007)
-
(2007)
ACM CCS 2007
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
Ateniese, G., Di Pietro, R., Mancini, L., Tsudik, G.: Scalable and efficient provable data possession. In: Proc. SecureComm 2008, pp. 1-10 (2008)
-
(2008)
Proc. SecureComm 2008
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.3
Tsudik, G.4
-
5
-
-
35248843604
-
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Bellare, M., Micciancio, D.,Warinschi, B.: Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614-629. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 614-629
-
-
Bellare, M.1
Micciancio, D.2
Warinschi, B.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. ACM CCS 2003, pp. 62-73 (2003)
-
(2003)
Proc. ACM CCS 2003
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
77954983075
-
Security for the cloud infrastructure: Trusted virtual data center implementation
-
Berger, S., Caceres, R., Goldman, K., Pendarakis, D., Perez, R., Rao, J., Rom, E., Sailer, R., Schildhauer, W., Srinivasan, D., Tal, S., Valdez, E.: Security for the cloud infrastructure: Trusted virtual data center implementation. IBM Journal of Research and Development 53(4)
-
IBM Journal of Research and Development
, vol.53
, Issue.4
-
-
Berger, S.1
Caceres, R.2
Goldman, K.3
Pendarakis, D.4
Perez, R.5
Rao, J.6
Rom, E.7
Sailer, R.8
Schildhauer, W.9
Srinivasan, D.10
Tal, S.11
Valdez, E.12
-
8
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
64849115333
-
A case for P2P infrastructure for social networks - Opportunities and challenges
-
Buchegger, S., Datta, A.: A case for P2P infrastructure for social networks - opportunities and challenges. In: WONS 2009 (2009)
-
(2009)
WONS 2009
-
-
Buchegger, S.1
Datta, A.2
-
13
-
-
70450172971
-
PeerSoN: P2P social networking - Early experiences and insights
-
Buchegger, S., Schiöberg, D., Vu, L., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: WOSN 2009 (2009)
-
(2009)
WOSN 2009
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.3
Datta, A.4
-
15
-
-
0001604533
-
Blind signatures for untraceable payments
-
Chaum, D.: Blind signatures for untraceable payments. In: Proc. CRYPTO 1982 (1982)
-
Proc. CRYPTO 1982 (1982)
-
-
Chaum, D.1
-
16
-
-
85024290278
-
Group signatures
-
Davies, D.W. (ed.) EUROCRYPT 1991. Springer, Heidelberg
-
Chaum, D., Van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
18
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
-
Cramer, R., Damgård, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 174-187. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
19
-
-
64849110666
-
Privacy preserving social networking through decentralization
-
Cutillo, L., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: WONS 2009 (2009)
-
(2009)
WONS 2009
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
20
-
-
85023809951
-
Threshold cryptosystems
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
21
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
22
-
-
4544304744
-
The sybil attack
-
Douceur, J.: The sybil attack. In: Proc. IPTPS 2001, pp. 251-260 (2001)
-
(2001)
Proc. IPTPS 2001
, pp. 251-260
-
-
Douceur, J.1
-
23
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.) CRYPTO 1986. Springer, Heidelberg
-
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186-194. Springer, Heidelberg (1987)
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
24
-
-
0016560084
-
Fast approximation for the knapsack and sum of subset problems
-
Ibarra, O., Kim, C.: Fast approximation for the knapsack and sum of subset problems. Journal of ACM 22(4), 463-468 (1975)
-
(1975)
Journal of ACM
, vol.22
, Issue.4
, pp. 463-468
-
-
Ibarra, O.1
Kim, C.2
-
25
-
-
0036085965
-
Design of a role-based trust-management framework
-
Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114-130 (2002)
-
(2002)
Proc. IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
28
-
-
74049152260
-
Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds. In: CCS 2009 (2009)
-
(2009)
CCS 2009
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
29
-
-
77954989027
-
On monotone formula closure of SZK
-
De Santis, A., Di Crescenzo, G., Persiano, G., Yung, M.: On monotone formula closure of SZK. In: Proc. 35th IEEE Symp. on Foundations of Comp. Science
-
Proc. 35th IEEE Symp. on Foundations of Comp. Science
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
-
31
-
-
84995370788
-
Privacy, cost, and availability tradeoffs in decentralized osns
-
Shakimov, A., Varshavsky, A., Cox, L., Cáceres, R.: Privacy, cost, and availability tradeoffs in decentralized osns. In: Proc. WOSN 2009, pp. 13-18 (2009)
-
(2009)
Proc. WOSN 2009
, pp. 13-18
-
-
Shakimov, A.1
Varshavsky, A.2
Cox, L.3
Cáceres, R.4
-
32
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. C. ACM 22, 612-613 (1979)
-
(1979)
C. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
35
-
-
77954996619
-
-
TCG, https://www.trustedcomputinggroup.org/
-
-
-
-
36
-
-
84871269023
-
The case for enterprise-ready virtual private clouds
-
Wood, T., Shenoy, P., Gerber, A., Ramakrishnan, K., Van der Merwe, J.: The case for enterprise-ready virtual private clouds. In: Proc. HotCloud 2009 (2009)
-
Proc. HotCloud 2009 (2009)
-
-
Wood, T.1
Shenoy, P.2
Gerber, A.3
Ramakrishnan, K.4
Van Der Merwe, J.5
-
37
-
-
77952350757
-
Exploiting social networks for threshold signing: Attack-resilience vs. availability
-
Xu, S., Li, X., Parker, P.: Exploiting social networks for threshold signing: Attack-resilience vs. availability. In: Proc. ACM ASIACCS 2008, pp. 325-336 (2008)
-
(2008)
Proc. ACM ASIACCS 2008
, pp. 325-336
-
-
Xu, S.1
Li, X.2
Parker, P.3
-
39
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proc. ACM SIGCOMM 2006, pp. 267-278 (2006)
-
(2006)
Proc. ACM SIGCOMM 2006
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
|