-
1
-
-
72249085354
-
FAWN: A fast array of wimpy nodes
-
D. G. Andersen, J. Franklin, M. Kaminsky, A. Phanishayee, L. Tan, and V. Vasudevan. FAWN: A fast array of wimpy nodes. In Proc. ACM SOSP, 2009.
-
(2009)
Proc. ACM SOSP
-
-
Andersen, D.G.1
Franklin, J.2
Kaminsky, M.3
Phanishayee, A.4
Tan, L.5
Vasudevan, V.6
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. ACM CCS, pages 598-609, 2007.
-
(2007)
Proc. ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
84947906522
-
The exact security of digital signatures: How to sign with RSA and rabin
-
U. Maurer, editor Springer-Verlag
-
M. Bellare and P. Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. In U. Maurer, editor, Proc. EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer-Verlag, 1989.
-
(1989)
Proc. EUROCRYPT '96, Volume 1070 of LNCS
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
K. Bowers, A. Juels, and A. Oprea. HAIL: A high-availability and integrity layer for cloud storage. In Proc. ACM CCS '09, pages 187-198, 2009.
-
(2009)
Proc. ACM CCS '09
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
5
-
-
80755159951
-
-
IACR ePrint manuscript 2010/214
-
K. D. Bowers, M. van Dijk, A. Juels, A Oprea, and R. Rivest. How to tell if your cloud files are vulnerable to drive crashes, 2010. IACR ePrint manuscript 2010/214.
-
(2010)
How to Tell If Your Cloud Files Are Vulnerable to Drive Crashes
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.5
-
6
-
-
84976295016
-
Distance-bounding protocols (extended abstract)
-
Springer LNCS
-
S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In Proc. EUROCRYPT '93, pages 344-359. Springer, 1993. LNCS vol. 765.
-
(1993)
Proc. EUROCRYPT '93
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
8
-
-
80755159954
-
T-mobile, microsoft tell sidekick users we 'continue to do all we can' to restore data
-
October 13
-
J. Cox. T-Mobile, Microsoft tell Sidekick users we 'continue to do all we can' to restore data. Network World, October 13, 2009.
-
(2009)
Network World
-
-
Cox, J.1
-
10
-
-
78650345904
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In Proc. TCC, 2009.
-
(2009)
Proc. TCC
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
11
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
E.F. Brickell, editor Springer LNCS
-
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E.F. Brickell, editor, Proc. CRYPTO '92, pages 139-147. Springer, 1992. LNCS vol. 740.
-
(1992)
Proc. CRYPTO '92
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
12
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Springer
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. CRYPTO'86, volume 263 of LNCS, pages 186-194. Springer, 1986.
-
(1986)
Proc. CRYPTO'86, Volume 263 of LNCS
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
13
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proc. ACM SOSP, pages 193-206, 2003. (Pubitemid 40929697)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
14
-
-
21644437974
-
The google file system
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
S. Ghemawat, H. Gobioff, and S.T. Leung. The Google file system. In Proc. ACM SOSP, pages 29-43, 2003. (Pubitemid 40929686)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
15
-
-
84919877604
-
Cryptographic Primitives Enforcing Communication and Storage Complexity
-
Financial Cryptography
-
P. Golle, S. Jarecki, and I. Mironov. Cryptographic primitives enforcing communication and storage complexity. In Proc. Financial Cryptography, pages 120-135. Springer, 2002. LNCS vol. 2357. (Pubitemid 36316775)
-
(2003)
Lecture Notes in Computer Science
, Issue.2357
, pp. 120-135
-
-
Golle, P.1
Jarecki, S.2
Mironov, I.3
-
17
-
-
80755172977
-
-
The Hadoop distributed file system. http://hadoop.apache.org/hdfs.
-
-
-
-
19
-
-
80755173897
-
-
Mozy CTO J. Herlocker. Personal Communication, 2011
-
Mozy CTO J. Herlocker. Personal Communication, 2011.
-
-
-
-
20
-
-
0002459783
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. ISOC NDSS, pages 151-165, 1999.
-
(1999)
Proc. ISOC NDSS
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
21
-
-
74049103479
-
PORs-proofs of retrievability for large files
-
A. Juels and B. Kaliski. PORs-proofs of retrievability for large files. In Proc. ACM CCS 2007, pages 584-597, 2007.
-
(2007)
Proc. ACM CCS 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.2
-
22
-
-
0033720713
-
On the efficiency of local decoding procedures for error-correcting codes
-
J. Katz and L. Trevisan. On the efficiency of local decoding procedures for error-correcting codes. In Proc. STOC, pages 80-86, 2000.
-
(2000)
Proc. STOC
, pp. 80-86
-
-
Katz, J.1
Trevisan, L.2
-
23
-
-
84920746689
-
Safestore: A durable and practical storage system
-
Berkeley, CA, USA USENIX Association
-
R. Kotla, L. Alvisi, and M. Dahlin. Safestore: a durable and practical storage system. In Proc. USENIX'07, pages 10:1-10:14, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proc. USENIX'07
, pp. 101-1014
-
-
Kotla, R.1
Alvisi, L.2
Dahlin, M.3
-
25
-
-
84969346266
-
A certified digital signature
-
Springer-Verlag
-
R. Merkle. A certified digital signature. In Proc. Crypto 1989, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1989.
-
(1989)
Proc. Crypto 1989, Volume 435 of LNCS
, pp. 218-238
-
-
Merkle, R.1
-
27
-
-
33748605569
-
The complexity of online memory checking
-
M. Naor and G. N. Rothblum. The complexity of online memory checking. In Proc. 46th IEEE FOCS, pages 573-584, 2005.
-
(2005)
Proc. 46th IEEE FOCS
, pp. 573-584
-
-
Naor, M.1
Rothblum, G.N.2
-
28
-
-
77954780208
-
The case for RAMClouds: Scalable high-performance storage entirely in dram
-
J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazières, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S. M. Rumble, E. Stratmann, and R. Stutsman. The case for RAMClouds: Scalable high-performance storage entirely in dram. SIGOPS Operating Systems Review, 43(4):92-105, 2009.
-
(2009)
SIGOPS Operating Systems Review
, vol.43
, Issue.4
, pp. 92-105
-
-
Ousterhout, J.1
Agrawal, P.2
Erickson, D.3
Kozyrakis, C.4
Leverich, J.5
Mazières, D.6
Mitra, S.7
Narayanan, A.8
Parulkar, G.9
Rosenblum, M.10
Rumble, S.M.11
Stratmann, E.12
Stutsman, R.13
-
30
-
-
0028387091
-
An introduction to disk drive modeling
-
C. Ruemmler and J. Wilkes. An introduction to disk drive modeling. IEEE Computer, 27(3):17-29, 1994.
-
(1994)
IEEE Computer
, vol.27
, Issue.3
, pp. 17-29
-
-
Ruemmler, C.1
Wilkes, J.2
|