-
1
-
-
68249129760
-
-
Tech. Rep. UCB-EECS
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. Tech. Rep. UCB-EECS (2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
85165857969
-
-
Baidu, http://passport.baidu.com/?business&aid=6&un=chenfoxlord#7
-
-
-
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 (1970)
-
(1970)
Communications of the ACM
, vol.13
-
-
Bloom, B.H.1
-
4
-
-
0003160114
-
Computationally private information retrieval
-
Chor, B., Gilboa, N.: Computationally private information retrieval. In: Proc. STOC 1997 (1997)
-
(1997)
Proc. STOC 1997
-
-
Chor, B.1
Gilboa, N.2
-
5
-
-
85165837736
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proc. FOCS 1998 (1998)
-
(1998)
Proc. FOCS 1998
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
57049157741
-
A framework for the analysis of mix-based steganographic file systems
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Diaz, C., Troncoso, C., Preneel, B.: A framework for the analysis of mix-based steganographic file systems. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 428-445. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 428-445
-
-
Diaz, C.1
Troncoso, C.2
Preneel, B.3
-
7
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: Proc. SOSP 2003 (2003)
-
(2003)
Proc. SOSP 2003
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
8
-
-
0002337124
-
Towards a theory of software protection and simulation by oblivious rams
-
Goldreich, O.: Towards a theory of software protection and simulation by oblivious rams. In: Proc. STOC 1987 (1987)
-
(1987)
Proc. STOC 1987
-
-
Goldreich, O.1
-
9
-
-
0030149547
-
Software protection and simulation on oblivious ram
-
Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious ram. In: JACM 1996 (1996)
-
(1996)
JACM 1996
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
15
-
-
85141026002
-
On the computational practicality of private information retrieval
-
Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proc. NDSS 2007 (2007)
-
(2007)
Proc. NDSS 2007
-
-
Sion, R.1
Carbunar, B.2
-
16
-
-
49949108041
-
Traffic analysis attacks on a continuously-observable steganographic file system
-
Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. Springer, Heidelberg
-
Troncoso, C., Diaz, C., Dunkelman, O., Preneel, B.: Traffic analysis attacks on a continuously-observable steganographic file system. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 220-236. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4567
, pp. 220-236
-
-
Troncoso, C.1
Diaz, C.2
Dunkelman, O.3
Preneel, B.4
-
17
-
-
80051865953
-
Efficient and private access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. ICDCS 2011 (2011)
-
(2011)
Proc. ICDCS 2011
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
18
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proc. IWQoS 2009 (2009)
-
(2009)
Proc. IWQoS 2009
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
19
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. ICDCS 2010 (2010)
-
(2010)
Proc. ICDCS 2010
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
20
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proc. CCS 2008 (2008)
-
(2008)
Proc. CCS 2008
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
21
-
-
80053019963
-
-
Technical Report
-
Yang, K., Zhang, J., Zhang, W., Qiao, D.: A light-weight solution to preservation of access pattern privacy in un-trusted clouds. Technical Report (2011), http://www.public.iastate.edu/~yangka/PatternFull.pdf
-
(2011)
A Light-weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
-
-
Yang, K.1
Zhang, J.2
Zhang, W.3
Qiao, D.4
-
22
-
-
85165862579
-
-
Youtube, http://www.youtube.com/user/supercwm
-
Youtube
-
-
-
23
-
-
77953310709
-
Achieving secure, scalable, and fine-grained access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained access control in cloud computing. In: Proc. INFOCOM 2010 (2010)
-
(2010)
Proc. INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
24
-
-
2442485674
-
Hiding data accesses in steganographic file system
-
Zhou, X., Pang, H., Tan, K.L.: Hiding data accesses in steganographic file system. In: Proc. ICDE 2004 (2004)
-
(2004)
Proc. ICDE 2004
-
-
Zhou, X.1
Pang, H.2
Tan, K.L.3
|