-
2
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katzand, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katzand, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
84948986458
-
Optimal Asymmetric Encryption
-
Mihir Bellare and Phillip Rogaway. Optimal Asymmetric Encryption. In EUROCRYPT, pages 92-111, 1994.
-
(1994)
EUROCRYPT
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0345058960
-
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
-
E. Bresson, D. Catalano, and D. Pointcheval. A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. In Advances in Cryptology - ASIACRYPT'03, pages 37-54, 2003.
-
(2003)
Advances in Cryptology - ASIACRYPT'03
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
6
-
-
84958626761
-
Deniable Encryption
-
Adnvances in Cryptology - CRYPTO'97
-
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky. Deniable Encryption. In Adnvances in Cryptology - CRYPTO'97, volume 1294 of LNCS, pages 90-104, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
7
-
-
34547218499
-
A Forward-Secure Public-Key Encryption Scheme
-
R. Canetti, S. Halevi, and J. Katz. A Forward-Secure Public-Key Encryption Scheme. Journal of Cryptology, 20(3):265-294, 2007.
-
(2007)
Journal of Cryptology
, vol.20
, Issue.3
, pp. 265-294
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
84947196743
-
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
-
A. Czeskis, D. J. St. Hilaire, K. Koscher, S. D. Gribble, T. Kohno, and B. Schneier. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. In USENIX Workshop on Hot Topics in Security (HotSec'08), 2008.
-
USENIX Workshop on Hot Topics in Security (HotSec'08), 2008
-
-
Czeskis, A.1
St. Hilaire, D.J.2
Koscher, K.3
Gribble, S.D.4
Kohno, T.5
Schneier, B.6
-
9
-
-
84867553981
-
A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System
-
I. Damgard and M. Jurik. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography (PKC'01), pages 119-136, 2001.
-
(2001)
Public Key Cryptography (PKC'01)
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
11
-
-
70349557354
-
Hierarchical ID-based cryptography
-
C. Gentry and A. Silverberg. Hierarchical ID-based cryptography. In ASIACRYPT'02, pages 548-566, 2002.
-
(2002)
ASIACRYPT'02
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
13
-
-
69749086390
-
A Method for Obtaining Deniable Public-key Encryption
-
M. Ibrahim. A Method for Obtaining Deniable Public-key Encryption. International Journal of Network Security, 8(1):1-9, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 1-9
-
-
Ibrahim, M.1
-
15
-
-
33646202553
-
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
-
A. Kiayias and M. Yung. Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers. In Progress in Cryptology - Mycrypt'05, pages 151-170, 2005.
-
(2005)
Progress in Cryptology - Mycrypt'05
, pp. 151-170
-
-
Kiayias, A.1
Yung, M.2
-
16
-
-
38549145955
-
Practical Deniable Encryption
-
SPFSEM'08
-
M. Klonowski, P. Kubiak, and M. Kutylowski. Practical Deniable Encryption. In SPFSEM'08, volume 4910 of LNCS, pages 599-609, 2008.
-
(2008)
LNCS
, vol.4910
, pp. 599-609
-
-
Klonowski, M.1
Kubiak, P.2
Kutylowski, M.3
-
18
-
-
78650185562
-
-
Technical report, Indiana University
-
N. Mirzaei. Cloud Computing. Technical report, Indiana University, 2008.
-
(2008)
Cloud Computing
-
-
Mirzaei, N.1
-
19
-
-
84942550998
-
Public-key Cryptosystems Based on Composite Degree Residuosity Classes
-
P. Paillier. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT'99, pages 223-238, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
78650218331
-
-
Amazon S3 http://aws.amazon.com/s3/.
-
Amazon S3
-
-
-
24
-
-
78650187236
-
-
Dropbox http://www.dropbox.com/.
-
Dropbox
-
-
-
25
-
-
78650197834
-
-
Truecrypt http://www.truecrypt.org/.
-
Truecrypt
-
-
-
29
-
-
78650180845
-
Spam Suspect Uses Google Docs; FBI Happy
-
Wired: "Spam Suspect Uses Google Docs; FBI Happy" http://www.wired.com/threatlevel/2010/ 04/cloud-warrant/.
-
Wired
-
-
-
30
-
-
14844297376
-
ID-based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
-
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya. ID-based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. In ACM Conference on Computer and Communications Security (CCS'04), pages 354-363, 2004.
-
(2004)
ACM Conference on Computer and Communications Security (CCS'04)
, pp. 354-363
-
-
Yao, D.1
Fazio, N.2
Dodis, Y.3
Lysyanskaya, A.4
|