-
1
-
-
44949123778
-
A Fair Nonrepudiation Service in a Web Service Peer-to-Peer Environment
-
August
-
B. Agreiter, M. Hafner, and R. Breu, "A Fair Nonrepudiation Service in a Web Service Peer-to-Peer Environment," Computer Standards & Interfaces, vol 30, no 6, pp372-378, August 2008.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.6
, pp. 372-378
-
-
Agreiter, B.1
Hafner, M.2
Breu, R.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. "Provable data possession at untrusted stores". In Proc. ACM CCS 2007, 2007.
-
(2007)
Proc. ACM CCS
-
-
Burns, A.R.1
Curtmola, R.2
Herring, J.3
Kissner, L.4
Peterson, Z.5
Song, D.6
-
3
-
-
24944498581
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters, "Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys," Lecture Notes in Computer Science, 2005.
-
(2005)
Lecture Notes in Computer Science
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
72749089553
-
Trusting the cloud
-
C.Cachin, I.Keidar, and A. Shraer, "Trusting the Cloud", ACM SIGACT News, 20:4 (2009), pp. 81-86.
-
(2009)
ACM SIGACT News
, vol.20
, Issue.4
, pp. 81-86
-
-
Cachin, C.1
Keidar, I.2
Shraer, A.3
-
5
-
-
67349211491
-
Secure Multi-Party Payment with an Intermediary Entity
-
July
-
M. Carbonell, J. M. Sierra, and J. Lopez, "Secure Multi-Party Payment with an Intermediary Entity," Computers & Security, vol 28, no 5, pp289-300, July 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.5
, pp. 289-300
-
-
Carbonell, M.1
Sierra, J.M.2
Lopez, J.3
-
6
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug
-
G. Chiou and W. Chen, "Secure broadcasting using the secure lock," IEEE Transactions on Software Engineering, vol 15, no 8, pp929-934, Aug. 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.1
Chen, W.2
-
7
-
-
74049093526
-
Controlling data in the Cloud: Outsourcing computation without outsourcing control
-
November 13; Chicago, IL. NY ACM
-
R.Chow, P.Golle, M.Jakobsson, E.Shi, J.Staddon, R.Masuoka, and J.Molina, "Controlling data in the Cloud: outsourcing computation without outsourcing control", Proceedings of CCSW 2009, November 13; Chicago, IL. NY: ACM; 2009; 85-90.
-
(2009)
Proceedings of CCSW
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
8
-
-
77951265112
-
Bridging the missing link of cloud data storage security in aws
-
J. Feng, Y. Chen, and P. Liu, "Bridging the Missing Link of Cloud Data Storage Security in AWS", the 2010 IEEE CCNC'10, Las Vegas, Nevada, USA, January 9-12, 2010.
-
(2010)
The 2010 IEEE CCNC'10, Las Vegas, Nevada, USA, January
, pp. 9-12
-
-
Feng, J.1
Chen, Y.2
Liu, P.3
-
9
-
-
78649885971
-
Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms
-
San Diego, CA, USA, Sept
-
J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," the 2nd International Workshop on Security in Cloud Computing, in conjunction with ICPP 2010, San Diego, CA, USA, Sept. 14, 2010.
-
2nd International Workshop on Security in Cloud Computing, in Conjunction with ICPP 2010
, vol.14
, pp. 2010
-
-
Feng, J.1
Chen, Y.2
Ku, W.-S.3
Liu, P.4
-
10
-
-
70449628560
-
Persistent authenticated dictionaries and their applications
-
Seoul, Korea Dec
-
A. Anagnostopoulos, M.T. Goodrich, and R. Tamassia, " Persistent authenticated dictionaries and their applications", In International Conference on Information Security (ISC), Seoul, Korea, Dec. 2001.
-
(2001)
International Conference on Information Security (ISC
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
11
-
-
26844437053
-
On the security of fair non-repudiation protocols
-
Bristol, UK, October
-
S. Gurgens, C. Rudolph, and H. Vogt, "On the Security of Fair Non-repudiation Protocols," Proceedings of 2003 Information Security Conference, Bristol, UK, October 2003.
-
(2003)
Proceedings of 2003 Information Security Conference
-
-
Gurgens, S.1
Rudolph, C.2
Vogt, H.3
-
12
-
-
84864878412
-
Assessing the security risks of cloud computing
-
June 2
-
J. Heiser and M. Nicolett, "Assessing the Security Risks of Cloud Computing," Gartner Inc., June 2, 2008.
-
(2008)
Gartner Inc.
-
-
Heiser, J.1
Nicolett, M.2
-
13
-
-
74049103479
-
Proofs of retrievability for large files
-
A. Juels and B. S. K. Jr. Pors: "Proofs of retrievability for large files". In Proc. ACM CCS, pages 584-597, 2007
-
(2007)
Proc. ACM CCS
, pp. 584-597
-
-
Juels, A.1
Pors Jr., B.S.K.2
-
14
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, "Plutus: Scalable Secure File Sharing on Untrusted Storage," In USENIX FAST, pages 29 ~ 42, 2003.
-
(2003)
USENIX FAST
, vol.42
, pp. 29
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
16
-
-
84900847325
-
Improving fairness and privacy of zhou-gollmann's fair non-repudiation protocol
-
Aizu, Japan, September
-
K. Kim, S. Park, and J. Baek, "Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-repudiation Protocol," Proceedings of 1999 ICPP Workshop on Security, pp 140-145, Aizu, Japan, September 1999.
-
(1999)
Proceedings of 1999 ICPP Workshop on Security
, pp. 140-145
-
-
Kim, K.1
Park, S.2
Baek, J.3
-
17
-
-
33244454312
-
Securing distributed storage: Challenges, techniques, and systems
-
Fairfax, Virginia, USA
-
V. Kher and Y. Kim, "Securing distributed storage: challenges, techniques, and systems", Proceedings of the 2005 ACM workshop on Storage (StorageSS'05), pp9-25, Fairfax, Virginia, USA, 2005.
-
Proceedings of the 2005 ACM Workshop on Storage (StorageSS'05
, vol.2005
, pp. 9-25
-
-
Kher, V.1
Kim, Y.2
-
19
-
-
0039013903
-
Some guidelines for non-repudiation protocols
-
October
-
P. Louridas, "Some Guidelines for Non-repudiation Protocols," Computer Communication Review, vol 30, no 5, October 2000.
-
(2000)
Computer Communication Review
, vol.30
, Issue.5
-
-
Louridas, P.1
-
20
-
-
84959047912
-
A multi-party optimistic non-repudiation protocol
-
Seoul, Korea, December
-
O. Markowitch and S. Kremer, "A Multi-Party Optimistic Non-repudiation Protocol," Proceedings of 2000 International Conference on Information Security and Cryptology, pp 109-122, Seoul, Korea, December 2000.
-
(2000)
Proceedings of 2000 International Conference on Information Security and Cryptology
, pp. 109-122
-
-
Markowitch, O.1
Kremer, S.2
-
21
-
-
67449108412
-
A new fair non-repudiation protocol for secure negotiation and contract signing
-
February
-
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López and A. F. Gómez-Skarmeta, "A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing", Journal of Universal Computer Science, Vol.15, No.3, February , pp 555-584, 2009
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.3
, pp. 555-584
-
-
Ruiz-Martínez, A.1
Marín-López, C.I.2
Baño-López, L.3
Gómez-Skarmeta, A.F.4
-
24
-
-
78649328969
-
Secure multi-party nonrepudiation protocols and applications," ISBN 978-0-387-75629-5
-
Springer
-
J. Onieva, J. Lopez, and J. Zhou, "Secure Multi-Party Nonrepudiation Protocols and Applications," ISBN 978-0-387-75629-5, Advances in Info. Security Series, Springer, 2009.
-
(2009)
Advances in Info. Security Series
-
-
Onieva, J.1
Lopez, J.2
Zhou, J.3
-
25
-
-
80052798484
-
Enabling security in cloud storage slas with cloudproof
-
May
-
R. Popa, J. Lorch, D. Molnar, H.Wang, and L. Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof", Microsoft TechReport MSR-TR-2010-46, May, 2010.
-
(2010)
Microsoft TechReport MSR-TR-2010-46
-
-
Popa, R.1
Lorch, J.2
Molnar, D.3
Wang, H.4
Zhuang, L.5
-
26
-
-
67449108412
-
A new fair non-repudiation protocol for secure negotiation and contract signing
-
February
-
A. Ruiz-Martinez, I. Marin-Lopez, L. Bano-Lopez, and A. F. Gomez-Skarmeta, "A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing," Journal of Universal Computer Science, vol 15, no 3, February 2009.
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.3
-
-
Ruiz-Martinez, A.1
Marin-Lopez, I.2
Bano-Lopez, L.3
Gomez-Skarmeta, A.F.4
-
27
-
-
0029724319
-
A fair non-repudiation protocol
-
Oakland, USA, May
-
J. Zhou and D. Gollmann, "A Fair Non-repudiation Protocol," Proceedings of 1996 IEEE Symposium on Security and Privacy, pp 55-61, Oakland, USA, May 1996.
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy
, pp. 55-61
-
-
Zhou, J.1
Gollmann, D.2
-
28
-
-
0030672290
-
An efficient non-repudiation protocol
-
Oakland, USA May
-
J. Zhou and D. Gollmann, "An Efficient Non-repudiation Protocol," Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer, pp 126-132, Oakland, USA, May 1996.
-
(1996)
Proceedings of the 10th Computer Security Foundations Workshop. IEEE Computer
, pp. 126-132
-
-
Zhou, J.1
Gollmann, D.2
-
32
-
-
83255163356
-
-
http://www.certicom.com/index.php/software-securitysolutions
-
-
-
-
33
-
-
83255172142
-
-
Nov
-
Privacy in the Cloud Computing Era, http://download.microsoft.com/ download/3/9/1/3912E37E-5D7A-4775-B677-B7C2BAF10807/cloud-privacy-wp-102809.pdf, Nov, 2010.
-
(2010)
Privacy in the cloud computing era
-
-
|