-
1
-
-
85024260157
-
Cloud computing
-
B. Hayes, "Cloud computing," Commun. ACM, vol. 51, no. 7, pp. 9-11, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
2
-
-
72749089553
-
Trusting the cloud
-
C. Cachin, I. Keidar, and A. Shraer, "Trusting the cloud," SIGACT News, vol. 40, no. 2, pp. 81-86, 2009.
-
(2009)
SIGACT News
, vol.40
, Issue.2
, pp. 81-86
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
3
-
-
79955139162
-
-
Amazon.com, Amazon Web Services (AWS)
-
Amazon.com, "Amazon Web Services (AWS)," http://aws.amazon.com/s3/, 2009.
-
(2009)
-
-
-
4
-
-
79955160178
-
-
Microsoft.com, Microsoft Windows SkyDrive
-
Microsoft.com, "Microsoft Windows SkyDrive," http://windowslive.com/online/skydrive, 2009.
-
(2009)
-
-
-
5
-
-
79955164020
-
-
Nirvanix.com, Nirvanix cloudNAS
-
Nirvanix.com, "Nirvanix cloudNAS," http://www.nirvanix.com/products-services/, 2009.
-
(2009)
-
-
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
(New York, NY, USA), ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, (New York, NY, USA), pp. 598-609, ACM, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
7
-
-
74049103479
-
Pors: proofs of retrievability for large files
-
(New York, NY, USA), ACM
-
A. Juels and B. S. Kaliski, Jr., "Pors: proofs of retrievability for large files," in CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, (New York, NY, USA), pp. 584-597, ACM, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
8
-
-
57049134700
-
Remote integrity check with dishonest storage server
-
Springer Berlin / Heidelberg
-
E.-C. Chang and J. Xu, "Remote integrity check with dishonest storage server," in 13th ESORICS, pp. 223-237, Springer Berlin / Heidelberg, 2008.
-
(2008)
13th ESORICS
, pp. 223-237
-
-
Chang, E.-C.1
Xu, J.2
-
9
-
-
68149102542
-
Efficient integrity checking of untrusted network storage
-
ACM
-
A. Heitzmann, B. Palazzi, C. Papamanthou, and R. Tamassia, "Efficient integrity checking of untrusted network storage," in StorageSS '08, pp. 43-54, ACM, 2008.
-
(2008)
StorageSS '08
, pp. 43-54
-
-
Heitzmann, A.1
Palazzi, B.2
Papamanthou, C.3
Tamassia, R.4
-
10
-
-
74049144464
-
HAIL: a high-availability and integrity layer for cloud storage
-
(New York, NY, USA), ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "HAIL: a high-availability and integrity layer for cloud storage, " in CCS '09, (New York, NY, USA), pp. 187-198, ACM, 2009.
-
(2009)
CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
11
-
-
60349091619
-
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
-
I.-C. Lin and C.-C. Chang, "A countable and time-bound password-based user authentication scheme for the applications of electronic commerce," Information Sciences, vol. 179, no. 9, pp. 1269 - 1277, 2009.
-
(2009)
Information Sciences
, vol.179
, Issue.9
, pp. 1269-1277
-
-
Lin, I.-C.1
Chang, C.-C.2
-
12
-
-
84939573910
-
Differential power analysis
-
(London, UK), Springer-Verlag
-
P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, (London, UK), pp. 388-397, Springer-Verlag, 1999.
-
(1999)
CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
13
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
T. Messerges, E. Dabbish, and R. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
15
-
-
79955133971
-
-
Crypto++ 5.6.0 benchmarks
-
"Crypto++ 5.6.0 benchmarks," http://www.cryptopp.com/benchmarks.html.
-
(2000)
-
-
-
16
-
-
79955126486
-
-
Secure hash standard, Federal Information Processing Standards Publication 180-2, August
-
"Secure hash standard," Federal Information Processing Standards Publication 180-2, August 2002
-
(2002)
-
-
|