-
1
-
-
46649090585
-
Remote integrity checking
-
Switzerland, Nov. 13-14
-
Deswarte Y, Quisquater J J, and Saidane A. Remote integrity checking. Proceedings of IICIS'03, Switzerland, Nov. 13-14, 2003: 1-11.
-
(2003)
Proceedings of IICIS'03
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.J.2
Saidane, A.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, Virginia, USA, Oct. 28-31
-
Ateniese G, Burns R, Curtmola R, et al.. Provable data possession at untrusted stores. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 598-609.
-
(2007)
Proceedings of ACM-CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
3
-
-
72449185582
-
Proofs of Storage from homomorphic identification protocols
-
Tokyo, Japan, Dec. 6-10
-
Ateniese G. Kamara S, and Katz J. Proofs of Storage from homomorphic identification protocols. Proceedings of ASIACRYPT'09, Tokyo, Japan, Dec. 6-10, 2009: 319-333.
-
(2009)
Proceedings of ASIACRYPT'09
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
4
-
-
70249129465
-
Scalable and efficient provable data possession
-
Istanbul, Turkey, Sept. 22-26
-
Ateniese G, Pietro R D, Mancini L V, et al.. Scalable and efficient provable data possession. Proceedings of SecureComm'08, Istanbul, Turkey, Sept. 22-26, 2008: 1-10.
-
(2008)
Proceedings of SecureComm'08
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
-
5
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
Beijing, China, June 19
-
Curtmola R, Khan O, Burns R, and Ateniese G. MR-PDP: multiple-replica provable data possession. Proceedings of ICDCS'08, Beijing, China, June 19, 2008: 411-420.
-
(2008)
Proceedings of ICDCS'08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
6
-
-
80053965686
-
-
Chinese source
-
2009, 46(10): 1660-1668.
-
(2009)
, vol.46
, Issue.10
, pp. 1660-1668
-
-
-
7
-
-
74049121230
-
Dynamic provable data possession
-
Chicago, Illinois, USA, Nov. 9-13
-
Erway C, Küpçü A, Papamanthou C, et al.. Dynamic provable data possession. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 213-222.
-
(2009)
Proceedings of ACM-CCS'09
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
-
8
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Alexandria, Virginia, USA, Oct. 28-31
-
Juels A and Kaliski B S. Pors: proofs of retrievability for large files. Proceedings of ACM-CCS'07, Alexandria, Virginia, USA, Oct. 28-31, 2007: 584-597.
-
(2007)
Proceedings of ACM-CCS'07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
9
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Australia, Dec. 7-11
-
Shacham H and Waters B. Compact proofs of retrievability. Proceedings of ASIACRYPT'08, Melbourne, Australia, Dec. 7-11, 2008: 90-107.
-
(2008)
Proceedings of ASIACRYPT'08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
10
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh D, Lynn B, and Shacham H. Short signatures from the Weil pairing. Journal of Cryptology, 2004, 17(4): 297-319.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
San Francisco, CA, USA, Mar. 15-17
-
Dodis Y, Vadhan S, and Wichs D. Proofs of retrievability via hardness amplification. Proceedings of TCC'09, San Francisco, CA, USA, Mar. 15-17, 2009: 109-127.
-
(2009)
Proceedings of TCC'09
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
12
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
Chicago, Illinois, USA, Nov. 9-13
-
Bowers K D, Juels A, and Oprea A. Proofs of retrievability: theory and implementation. Proceedings of ACM-CCSW'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 43-54.
-
(2009)
Proceedings of ACM-CCSW'09
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
13
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
Chicago, Illinois, USA, Nov. 9-13
-
Bowers K D, Juels A, and Oprea A. HAIL: a high-availability and integrity layer for cloud storage. Proceedings of ACM-CCS'09, Chicago, Illinois, USA, Nov. 9-13, 2009: 187-198.
-
(2009)
Proceedings of ACM-CCS'09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
14
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Charleston, South Carolina, July 13-15
-
Wang C, Wang Q, Ren K, et al.. Ensuring data storage security in cloud computing. Proceedings of IWQoS'09, Charleston, South Carolina, July 13-15, 2009: 1-9.
-
(2009)
Proceedings of IWQoS'09
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
-
15
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Saint Malo, France, Sept. 21-25
-
Wang Q, Wang C, Li J, Ren K, et al.. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of ESORICS'09, Saint Malo, France, Sept. 21-25, 2009: 355-370.
-
(2009)
Proceedings of ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
-
16
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego, CA, Mar
-
Wang C, Wang Q, Ren K, et al.. Privacy-preserving public auditing for data storage security in cloud computing. Proceedings of INFOCOM 2010, San Diego, CA, Mar. 2010: 525-533.
-
(2010)
Proceedings of INFOCOM 2010
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
-
17
-
-
29344447400
-
Schneier on security
-
Bruce Schneier. Schneier on Security. http://www.schneier.com/blog/archives/2009/07/ homomorphic_enc.html.
-
-
-
Schneier, B.1
-
18
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Berkeley, California, May 9-12
-
Krohn M N, Freedman M J, and Mazières D. On-the-fly verification of rateless erasure codes for efficient content distribution. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, California, May 9-12, 2004: 226-240.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazières, D.3
-
19
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
Santa Barbara, CA, Aug.
-
Bellare M, Goldreich O, and Goldwasser S. Incremental cryptography: the case of hashing and signing. Advances in Cryptology-CRYPTO'94, Santa Barbara, CA, Aug. 1994: 216-233.
-
(1994)
Advances in Cryptology-CRYPTO'94
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
20
-
-
70449491157
-
Speeding up homomorpic Hashing using GPUs
-
Dresden, Germany, June 14-18
-
Zhao Kai-yong, Chu Xiao-wen, Wang Mea, et al.. Speeding up homomorpic Hashing using GPUs. The 2009 (44th) IEEE Conference on Communication (ICC 2009), Dresden, Germany, June 14-18, 2009: 1-5.
-
(2009)
The 2009 (44th) IEEE Conference on Communication (ICC 2009)
, pp. 1-5
-
-
Zhao, K.-Y.1
Chu, X.-W.2
Wang, M.3
|