-
1
-
-
74049102823
-
-
Ning et al. [14]
-
G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song. Provable data possession at untrusted stores. In Ning et al. [14], pages 598-609.
-
Provable Data Possession at Untrusted Stores
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
3
-
-
80755159951
-
How to tell if your cloud files are vulnerable to drive crashes
-
K. D. Bowers, M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to tell if your cloud files are vulnerable to drive crashes. Cryptology ePrint Archive, Report 2010/214, 2010. http://eprint.iacr.org/.
-
(2010)
Cryptology EPrint Archive, Report 2010/214
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
4
-
-
21844440623
-
Vivaldi: A decentralized network coordinate system
-
DOI 10.1145/1030194.1015471, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
F. Dabek, R. Cox, F. Kaashoek, and R. Morris. Vivaldi: a decentralized network coordinate system. In Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '04, pages 15-26, New York, NY, USA, 2004. ACM. (Pubitemid 40954866)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 15-26
-
-
Dabek, F.1
Cox, R.2
Kaashoek, F.3
Morris, R.4
-
5
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
O. Reingold, editor of Lecture Notes in Computer Science Springer
-
Y. Dodis, S. P. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In O. Reingold, editor, TCC, volume 5444 of Lecture Notes in Computer Science, pages 109-127. Springer, 2009.
-
(2009)
TCC
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.P.2
Wichs, D.3
-
6
-
-
0032669826
-
An architecture for a global internet host distance estimation service
-
P. Francis, S. Jamin, V. Paxson, L. Zhang, D. F. Gryniewicz, and Y. Jin. An architecture for a global internet host distance estimation service. In IEEE INFOCOM, pages 210-217, 1999.
-
(1999)
IEEE INFOCOM
, pp. 210-217
-
-
Francis, P.1
Jamin, S.2
Paxson, V.3
Zhang, L.4
Gryniewicz, D.F.5
Jin, Y.6
-
7
-
-
14944342002
-
Constraint-based geolocation of Internet hosts
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
B. Gueye, A. Ziviani, M. Crovella, and S. Fdida. Constraint-based geolocation of internet hosts. In IEEE/ACM Transactions on Networking, pages 288-293, 2004. (Pubitemid 40372056)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 288-293
-
-
Gueye, B.1
Crovella, M.2
Ziviani, A.3
Fdida, S.4
-
10
-
-
34547469869
-
Towards IP geolocation using delay and topology measurements
-
DOI 10.1145/1177080.1177090, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
E. Katz-Bassett, J. P. John, A. Krishnamurthy, D. Wetherall, T. E. Anderson, and Y. Chawathe. Towards ip geolocation using delay and topology measurements. In J. M. Almeida, V. A. F. Almeida, and P. Barford, editors, Internet Measurement Conference, pages 71-84. ACM, 2006. (Pubitemid 47165590)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 71-84
-
-
Katz-Bassett, E.1
John, J.P.2
Krishnamurthy, A.3
Wetherall, D.4
Anderson, T.5
Chawathe, Y.6
-
11
-
-
77955665653
-
A model based approach for improving router geolocation
-
S. Laki, P. Matray, P. Hága, I. Csabai, and G. Vattay. A model based approach for improving router geolocation. Computer Networks, 54(9):1490-1501, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.9
, pp. 1490-1501
-
-
Laki, S.1
Matray, P.2
Hága, P.3
Csabai, I.4
Vattay, G.5
-
12
-
-
80955151235
-
-
A. W. S. LLC
-
A. W. S. LLC. Amazon simple storage service (amazon s3). http://aws.amazon.com/s3/#protecting, 2010.
-
(2010)
-
-
-
14
-
-
80955151227
-
-
CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM
-
P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors. Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007. ACM, 2007.
-
(2007)
Proceedings of the 2007 ACM Conference on Computer and Communications Security
-
-
Ning, P.1
Di Vimercati, S.D.C.2
Syverson, P.F.3
-
15
-
-
0012892008
-
Issues in web content replication
-
M. Rabinovich. Issues in web content replication. IEEE Data Eng. Bull., 21(4):21-29, 1998.
-
(1998)
IEEE Data Eng. Bull.
, vol.21
, Issue.4
, pp. 21-29
-
-
Rabinovich, M.1
-
16
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
E. Al-Shaer, S. Jha, and A. D. Keromytis, editors ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 199-212. ACM, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
17
-
-
58349118819
-
Compact proofs of retrievability
-
J. Pieprzyk, editor of Lecture Notes in Computer Science Springer
-
H. Shacham and B. Waters. Compact proofs of retrievability. In J. Pieprzyk, editor, ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 90-107. Springer, 2008.
-
(2008)
ASIACRYPT
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
18
-
-
80052008862
-
HomeAlone: Co-residency detection in the cloud via side-channel analysis
-
IEEE Computer Society, May
-
Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. HomeAlone: Co-residency detection in the cloud via side-channel analysis. In Proceedings of IEEE Security and Privacy ("Oakland") 2011. IEEE Computer Society, May 2011.
-
(2011)
Proceedings of IEEE Security and Privacy ("Oakland,") 2011
-
-
Zhang, Y.1
Juels, A.2
Oprea, A.3
Reiter, M.K.4
|