-
1
-
-
70249129465
-
Scalable and efficient provable data possession
-
2008
-
Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In Proceedings of the 4th international conference on security and privacy in communication networks (SecureComm'08), 1-10, 2008.
-
(2008)
Proceedings of the 4th international conference on security and privacy in communication networks (SecureComm'08)
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security, ACM, 2007, 598-609.
-
(2007)
Proceedings of the 14th ACM conference on computer and communications security, ACM, 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
Las Vegas, Nevada, United States, May 29-June 01, 1995
-
Bellare M, Goldreich O, Goldwasser S (1995) Incremental cryptography and application to virus protection. In Proceedings of the 27th annual ACM symposium on theory of computing, Las Vegas, Nevada, United States, 45-56, May 29-June 01, 1995.
-
(1995)
Proceedings of the 27th annual ACM symposium on theory of computing
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
4
-
-
0026405370
-
Checking the correctness of memories
-
San Juan, Puerto Rico, 1-4 October 1991
-
Blum M, Evans WS, Gemmell P, Kannan S, Naor M (1991) Checking the correctness of memories. In 32nd annual symposium on foundations of computer science, San Juan, Puerto Rico, 90-99, 1-4 October 1991.
-
(1991)
32nd annual symposium on foundations of computer science
, pp. 90-99
-
-
Blum, M.1
Evans, W.S.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
6
-
-
33947651908
-
Establishing trust in distributed storage providers
-
Linkoping, Sweden, 128-133, September 2003
-
Caronni G, Waldvogel M (2003) Establishing trust in distributed storage providers. In Proceedings of 3rd IEEE international conference on P2P computing, Linkoping, Sweden, 128-133, September 2003.
-
(2003)
Proceedings of 3rd IEEE international conference on P2P computing
-
-
Caronni, G.1
Waldvogel, M.2
-
9
-
-
74049121230
-
-
Chicago IL, USA, 2009
-
Erway C, Kupcu A, Papamanthou C, Tamassia R (2008) In Proceedings of the ACM International Conference on Computer and Communications Security (CCS), Chicago IL, USA, 213-222, 2009.
-
(2008)
Proceedings of the ACM International Conference on Computer and Communications Security (CCS)
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
10
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
Report 2006/150, 2006
-
Filho LDG, Barreto PSLM (2006) Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006. http://eprint. iacr. org.
-
(2006)
Cryptology ePrint Archive
-
-
Filho, L.D.G.1
Barreto, P.S.L.M.2
-
12
-
-
57049139969
-
PORs: proofs of retrievability for large files
-
June 2007. Report 2007/243
-
Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. Cryptology ePrint archive, June 2007. Report 2007/243.
-
(2007)
Cryptology ePrint archive
-
-
Juels, A.1
Kaliski, B.S.2
-
13
-
-
84968503742
-
Elliptic curve cryptosystems
-
1987
-
Koblitz N (1987) Elliptic curve cryptosystems. Mathematics of computation, vol 48, 203-209, 1987.
-
(1987)
Mathematics of computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
70350769266
-
-
CoNEXT. ACM, 2008
-
Leng C, Terpstra WW, Kemme B, Stannat W, Buchmann AP (2008) Maintaining replicas in unstructured P2P systems. CoNEXT, page 19. ACM, 2008.
-
(2008)
Maintaining replicas in unstructured P2P systems
, pp. 19
-
-
Leng, C.1
Terpstra, W.W.2
Kemme, B.3
Stannat, W.4
Buchmann, A.P.5
-
15
-
-
85077532807
-
A cooperative internet backup scheme
-
San Antonio, Texas, June 2003
-
Lillibridge M, Elnikety S, Birrell A, Burrows M, Isard M (2003) A cooperative internet backup scheme. In Proceedings of the 2003 usenix annual technical conference (General Track), San Antonio, Texas, 29-41, June 2003.
-
(2003)
Proceedings of the 2003 usenix annual technical conference (General Track)
, pp. 29-41
-
-
Lillibridge, M.1
Elnikety, S.2
Birrell, A.3
Burrows, M.4
Isard, M.5
-
20
-
-
44349160835
-
Securing ad hoc storage through probabilistic cooperation assessment
-
3rd Workshop on Cryptography for Ad hoc Networks, July 8th, 2007, Wroclaw, Poland, N°2, May 26, 2008
-
Oualha N, Roudier Y (2007) Securing ad hoc storage through probabilistic cooperation assessment. 3rd Workshop on Cryptography for Ad hoc Networks, July 8th, 2007, Wroclaw, Poland. Electronic notes in theoretical computer science, vol 192, N°2, May 26, 2008, pp 17-29.
-
(2007)
Electronic notes in theoretical computer science
, vol.192
, pp. 17-29
-
-
Oualha, N.1
Roudier, Y.2
-
22
-
-
84858595135
-
Securing P2P storage with a self-organizing payment scheme
-
Athens, Greece, September 23, 2010
-
Oualha N, Roudier Y (2010) Securing P2P storage with a self-organizing payment scheme. 3rd international workshop on autonomous and spontaneous security (SETOP 2010), Athens, Greece, September 23, 2010.
-
(2010)
3rd international workshop on autonomous and spontaneous security (SETOP 2010)
-
-
Oualha, N.1
Roudier, Y.2
-
23
-
-
48249115117
-
A security protocol for self-organizing data storage
-
Milan, Italy, September 2008
-
Oualha N, Önen M, Roudier Y (2008) A security protocol for self-organizing data storage. 23rd International Information Security Conference (IFIP SEC 2008), Milan, Italy, 675-679, September 2008.
-
(2008)
23rd International Information Security Conference (IFIP SEC 2008)
, pp. 675-679
-
-
Oualha, N.1
Önen, M.2
Roudier, Y.3
-
28
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Aug 2008. ISSN: 1041-4347
-
Sebé F, Domingo-Ferrer J, Martínez-Ballesté A, Deswarte Y, Quisquater J-J (2007) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20: 1034-1038, Aug 2008. ISSN: 1041-4347.
-
(2007)
IEEE Trans Knowl Data Eng
, vol.20
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
29
-
-
58349118819
-
Compact proofs of retrievability
-
Springer-Verlag, 2008
-
Shacham H, Waters B (2008) Compact proofs of retrievability. In Proceedings of Asiacrypt 2008, lecture notes in computer science, vol 5350. Springer-Verlag, pp. 90-107, 2008.
-
(2008)
Proceedings of Asiacrypt 2008, lecture notes in computer science
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
30
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego, California, USA, March 14-19, 2010
-
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on information communications, San Diego, California, USA, 525-533, March 14-19, 2010.
-
(2010)
Proceedings of the 29th conference on information communications
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
31
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Saint Malo, France, September 21-25, 2009
-
Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, pp. 355-70, September 21-25, 2009.
-
(2009)
14th European Symposium on Research in Computer Security (ESORICS 2009)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
33
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Omer Reingold (ed). Springer-Verlag, Berlin, Heidelberg
-
Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography (TCC '09), Omer Reingold (ed). Springer-Verlag, Berlin, Heidelberg, 109-127.
-
(2009)
Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography (TCC '09)
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
34
-
-
74049136395
-
Proofs of retrievability: theory and implementation
-
ACM, New York, NY, USA
-
Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In Proceedings of the 2009 ACM workshop on cloud computing security (CCSW '09). ACM, New York, NY, USA, 43-54.
-
(2009)
Proceedings of the 2009 ACM workshop on cloud computing security (CCSW '09)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
|