-
2
-
-
84878675821
-
-
3rd Quarter
-
Akamai. The State of the Internet, 3rd Quarter 2010. www.akamai.com/ stateoftheinternet.
-
(2010)
The State of the Internet
-
-
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS '07, pages 598-609. ACM, 2007.
-
(2007)
ACM CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
ACM
-
K. Bowers, A. Juels, and A. Opera. Hail: a high-availability and integrity layer for cloud storage. In ACM CCS '09, pages 187-198. ACM, 2009.
-
(2009)
ACM CCS '09
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Opera, A.3
-
6
-
-
33745629609
-
Perfectly secure password protocols in the bounded retrieval model
-
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
G. DiCrescenzo, R. J. Lipton, and S. Walfish. Perfectly Secure Password Protocols in the Bounded Retrieval Model. In TCC'06, pages 225-244, 2006. (Pubitemid 43982458)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3876
, pp. 225-244
-
-
Di Crescenzo, G.1
Lipton, R.2
Walfish, S.3
-
10
-
-
67650314202
-
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
-
LNCS March
-
R. Elbaz, D. Champagne, C. Gebotys, R. B. Lee, N. Potlapally, and L. Torres. Hardware mechanisms for memory authentication: A survey of existing techniques and engines. ToCS IV, LNCS, pages 1-22, March 2009.
-
(2009)
ToCS IV
, pp. 1-22
-
-
Elbaz, R.1
Champagne, D.2
Gebotys, C.3
Lee, R.B.4
Potlapally, N.5
Torres, L.6
-
11
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput., 18(1):186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
12
-
-
84919877604
-
Cryptographic Primitives Enforcing Communication and Storage Complexity
-
Financial Cryptography
-
P. Golle, S. Jarecki, and I. Mironov. Cryptographic primitives enforcing communication and storage complexity. In "Financial Cryptography '02", volume 2357 of LNCS, pages 120-135. Springer, 2003. (Pubitemid 36316775)
-
(2003)
Lecture Notes in Computer Science
, Issue.2357
, pp. 120-135
-
-
Golle, P.1
Jarecki, S.2
Mironov, I.3
-
13
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. Cryptology ePrint Archive, Report 2011/207, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology EPrint Archive, Report 2011/207
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
14
-
-
78650053109
-
Side channels in cloud services, the case of deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services, the case of deduplication in cloud storage. IEEE Security and Privacy Magazine, special issue of Cloud Security, 2010.
-
(2010)
IEEE Security and Privacy Magazine, Special Issue of Cloud Security
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
15
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
ACM
-
A. Juels and B. S. Kaliski, Jr. Pors: proofs of retrievability for large files. In ACM CCS '07, pages 584-597. ACM, 2007.
-
(2007)
ACM CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
16
-
-
84969346266
-
A certified digital signature
-
CRYPTO '89 New York, NY, USA Springer-Verlag New York, Inc.
-
R. C. Merkle. A certified digital signature. In Proceedings on Advances in cryptology, CRYPTO '89, pages 218-238, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
Proceedings on Advances in Cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
17
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
8
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. In USENIX Security, 8 2011.
-
(2011)
USENIX Security
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
18
-
-
58349118819
-
Compact proofs of retrievability
-
Springer-Verlag
-
H. Shacham and B. Waters. Compact proofs of retrievability. In ASIACRYPT '08, pages 90-107. Springer-Verlag, 2008.
-
(2008)
ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
20
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Springer-Verlag
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS'09, pages 355-370. Springer-Verlag, 2009.
-
(2009)
ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|