-
1
-
-
84883663400
-
Cryptographic Cloud Storage
-
January Available
-
Seny Kamara and Kristin Lauter, "Cryptographic Cloud Storage," in Microsoft Research publications, January 2010. Available: http://research.microsoft.com/pubs/112576/crypto- cloud.pdf.
-
(2010)
Microsoft Research Publications
-
-
Kamara, S.1
Lauter, K.2
-
5
-
-
0004035649
-
-
Certicom, and Certicom, January Available
-
Certicom, C. Allen and Certicom, "The TLS Protocol Version 1.0," January 1999, Available: http://www.ietf.org/rfc/rfc2246.txt.
-
(1999)
The TLS Protocol Version 1.0
-
-
Allen, C.1
-
6
-
-
35048899816
-
Key Agreement using statically keyed authenticators
-
Applied Cryptography and Network Security (ACNS'04) Yellow Mountain, China, June 2004, to appear in Springer, doi: 10.1007/b98360
-
C. Boyd , W. Mao and K. Paterson, "Key Agreement using statically keyed authenticators,".In: Applied Cryptography and Network Security (ACNS'04) Yellow Mountain, China, June 2004, to appear in Lecture Notes in Computer Science, Springer, 2004,doi: 10.1007/b98360.
-
(2004)
Lecture Notes in Computer Science
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
7
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - Eurocrypt 2001, Spring-Verlag
-
Ran Canetti and Hugo Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS. Spring-Verlag, 2001.
-
LNCS
, vol.2045
, pp. 2001
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
71749113079
-
Identity-Based Authentication for Cloud Computing
-
M.G. Jaatun, G. Zhao, and C. Rong,eds: CloudCom 2009, Springer-Verlag Berlin Heidelberg
-
Hongwei Li, Yuanshun Dai, LingTian and Haomiao Yang, "Identity-Based Authentication for Cloud Computing," M.G. Jaatun, G. Zhao, and C. Rong,eds: CloudCom 2009, LNCS 5931 .Springer-Verlag Berlin Heidelberg ,2009.157-166.
-
(2009)
LNCS
, vol.5931
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
10
-
-
84937428623
-
Efficient algorithems for pairing-based cryptosystems
-
Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kin, B. Lynn, and M. Scott, "Efficient algorithems for pairing-based cryptosystems," Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computater Science. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computater Science
-
-
Barreto, P.S.L.M.1
Kin, H.Y.2
Lynn, B.3
Scott, M.4
-
11
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
J. Killian, editor, Advances in Cryptology - Proceedings of CRYPTO'01, Springer-Verlag
-
D.Boneh and M. Franklin, "Identity based encryption from the Weil pairing," J. Killian, editor, Advances in Cryptology - Proceedings of CRYPTO'01, Lecture Notes in Computer Science 2139.pp.213-229. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
82955246861
-
Implementing the Tate pairing
-
th International Symposium, ANTS-V, Springer-Verlag
-
th International Symposium, ANTS-V, volume 2369 of Lecture Notes in Computer Science.pp.324-337. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2369
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
15
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Available
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in. Proc. of IWQoS'09, July 2009. 19, Available: http://www.cs.odu.edu/~mukka/cs775s10/Presentations/Security.6.pdf.
-
Proc. of IWQoS'09, July 2009
, pp. 19
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
16
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
European Symposium on Research in Computer Security (ESORICS'09), SpRINGER, Available
-
Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," In European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, page 355-370.SpRINGER,2009, Available: http://eprint.iacr.org/2009/281.pdf.
-
(2009)
Lecture Notes in Computer Science
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
17
-
-
74049121230
-
Dynamic provable data possession
-
New York, NY,USA, ACM
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," In ACM conference on Computer and communications Security(CCS'09),pages 213-222, New York, NY,USA,2009,ACM.
-
(2009)
ACM Conference on Computer and Communications Security(CCS'09)
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
|