-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
(New York, NY, USA), ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in CCS '07, (New York, NY, USA), pp. 598-609, ACM, 2007.
-
(2007)
CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
aug.
-
F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," Knowledge and Data Engineering, IEEE Transactions on, vol. 20, pp. 1034-1038, aug. 2008.
-
(2008)
Knowledge and Data Engineering IEEE Transactions on
, vol.20
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
3
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM
-
G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in SecureComm '08, pp. 1-10, ACM, 2008.
-
(2008)
SecureComm '08
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
4
-
-
57049134700
-
Remote integrity check with dishonest storage server
-
Springer Berlin / Heidelberg
-
E.-C. Chang and J. Xu, "Remote integrity check with dishonest storage server," in 13th ESORICS, pp. 223-237, Springer Berlin / Heidelberg, 2008.
-
(2008)
13th ESORICS
, pp. 223-237
-
-
Chang, E.-C.1
Xu, J.2
-
5
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
IEEE
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," in ICDCS '08, pp. 411-420, IEEE, 2008.
-
(2008)
ICDCS '08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
6
-
-
74049121230
-
Dynamic provable data possession
-
ACM
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in CCS '09, pp. 213-222, ACM, 2009.
-
(2009)
CCS '09
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
7
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
july
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in Quality of Service, 2009. IWQoS. 17th International Workshop on, pp. 1-9, july 2009.
-
(2009)
Quality of Service 2009. IWQoS. 17th International Workshop on
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
8
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Springer Berlin / Heidelberg, September
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in 14th ESORICS, pp. 355-370, Springer Berlin / Heidelberg, September 2009.
-
(2009)
14th ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
9
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
March
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in InfoCom2010, IEEE, March 2010.
-
(2010)
InfoCom2010, IEEE
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
58349118819
-
Compact proofs of retrievability
-
(Berlin, Heidelberg), Springer-Verlag
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in ASIACRYPT '08, (Berlin, Heidelberg), pp. 90-107, Springer-Verlag, 2008.
-
(2008)
ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
12
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Transactions on Fundamentals, vol. E84-A, no. 5, pp. 1234-1243, 2001. (Pubitemid 32486851)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
13
-
-
82955246861
-
Implementing the tate pairing
-
(London, UK), Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera, "Implementing the tate pairing," in ANTS-V: Proceedings of the 5th International Symposium on Algorithmic Number Theory, (London, UK), pp. 324-337, Springer-Verlag, 2002.
-
(2002)
ANTS-V: Proceedings of the 5th International Symposium on Algorithmic Number Theory
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
15
-
-
84902475228
-
Remote integrity checking
-
(S. J. L. Strous, ed.), Kluwer Academic Publishers
-
Y. Deswarte and J.-J. Quisquater, "Remote Integrity Checking," in Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) (S. J. L. Strous, ed.), pp. 1-11, Kluwer Academic Publishers, 1 2004.
-
(2004)
Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS)
, vol.1
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.-J.2
-
17
-
-
85016272824
-
Auditing to keep online storage services honest
-
Usenix
-
M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to keep online storage services honest," in Proc. of HotOS XI., Usenix, 2007.
-
(2007)
Proc. of HotOS XI
-
-
Shah, M.A.1
Baker, M.2
Mogul, J.C.3
Swaminathan, R.4
-
18
-
-
70349245590
-
Robust remote data checking
-
ACM
-
R. Curtmola, O. Khan, and R. Burns, "Robust remote data checking," in StorageSS '08, pp. 63-68, ACM, 2008.
-
(2008)
StorageSS '08
, pp. 63-68
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
19
-
-
68149102542
-
Efficient integrity checking of untrusted network storage
-
ACM
-
A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia, "Efficient integrity checking of untrusted network storage," in StorageSS '08, pp. 43-54, ACM, 2008.
-
(2008)
StorageSS '08
, pp. 43-54
-
-
Heitzmann, A.1
Palazzi, B.2
Papamanthou, C.3
Tamassia, R.4
-
20
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Springer Berlin / Heidelberg
-
G. Ateniese, S. Kamara, and J. Katz, "Proofs of storage from homomorphic identification protocols," in ASIACRYPT 2009, pp. 319-333, Springer Berlin / Heidelberg, 2009.
-
(2009)
ASIACRYPT 2009
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
21
-
-
57049170853
-
Publicly verifiable remote data integrity
-
(Berlin, Heidelberg), Springer-Verlag
-
K. Zeng, "Publicly verifiable remote data integrity," in ICICS '08, (Berlin, Heidelberg), pp. 419-434, Springer-Verlag, 2008.
-
(2008)
ICICS '08
, pp. 419-434
-
-
Zeng, K.1
-
22
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
ACM
-
A. Juels and B. S. Kaliski, Jr., "PORs: proofs of retrievability for large files," in CCS '07, pp. 584-597, ACM, 2007.
-
(2007)
CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
23
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
(Berlin, Heidelberg), Springer-Verlag
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in TCC '09, (Berlin, Heidelberg), pp. 109-127, Springer-Verlag, 2009.
-
(2009)
TCC '09
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
24
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
(New York, NY, USA), ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation," in CCSW '09, (New York, NY, USA), pp. 43-54, ACM, 2009.
-
(2009)
CCSW '09
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
25
-
-
74049144464
-
HAIL: A highavailability and integrity layer for cloud storage
-
(New York, NY, USA), ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: a highavailability and integrity layer for cloud storage," in CCS '09, (New York, NY, USA), pp. 187-198, ACM, 2009.
-
(2009)
CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
|