-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. Provable data possession at untrusted stores. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, pages 598-609, 2007.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
2
-
-
35048887476
-
Short group signatures
-
proceedings of CRYPTO'04, Springer-Verlag
-
D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In In proceedings of CRYPTO'04, volume 3152 of LNCS, pages 41-55. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
3
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology (CRYPTO'01)
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology (CRYPTO'01), volume 2139 of LNCS, pages 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
77950844750
-
A study of user-friendly hash comparison schemes
-
H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H. Kikuchi, A. Perrig, H.-M. Sun, and B.-Y. Yang. A study of user-friendly hash comparison schemes. In ACSAC, pages 105-114, 2009.
-
(2009)
ACSAC
, pp. 105-114
-
-
Hsiao, H.-C.1
Lin, Y.-H.2
Studer, A.3
Studer, C.4
Wang, K.-H.5
Kikuchi, H.6
Perrig, A.7
Sun, H.-M.8
Yang, B.-Y.9
-
6
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
8
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
14-19
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1-9, 14-19 2010.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
9
-
-
84997556980
-
Integrity auditing of outsourced data
-
C. Koch, J. Gehrke, M. N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C. Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, and E. J. Neuhold, editors, ACM
-
M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In C. Koch, J. Gehrke, M. N. Garofalakis, D. Srivastava, K. Aberer, A. Deshpande, D. Florescu, C. Y. Chan, V. Ganti, C.-C. Kanne, W. Klas, and E. J. Neuhold, editors, VLDB, pages 782-793. ACM, 2007.
-
(2007)
VLDB
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
10
-
-
77950845927
-
Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems
-
A. A. Yavuz and P. Ning. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In ACSAC, pages 219-228, 2009.
-
(2009)
ACSAC
, pp. 219-228
-
-
Yavuz, A.A.1
Ning, P.2
-
11
-
-
84885684056
-
Strong accountability for network storage
-
USENIX
-
A. R. Yumerefendi and J. S. Chase. Strong accountability for network storage. In FAST, pages 77-92. USENIX, 2007.
-
(2007)
FAST
, pp. 77-92
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
12
-
-
79959319539
-
-
Technical Report PKU-CSE-10-04, Peking University and Arizona State University, April
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Cooperative provable data possession. Technical Report PKU-CSE-10-04, http://eprint.iacr. org/2010/234.pdf, Peking University and Arizona State University, April 2010.
-
(2010)
Cooperative Provable Data Possession
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
13
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Efficient provable data possession for hybrid clouds. In Proceedings of the 17th ACM conference on Computer and communications security, pages 756-758, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
|