메뉴 건너뛰기




Volumn 5, Issue 3, 2012, Pages 231-243

Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols

Author keywords

Cryptographic protocols; Data integrity; Distributed data storage; Peer to peer

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; DATA INTEGRITY; DATA STORAGE; DISTRIBUTED DATA STORAGE; DISTRIBUTED STORAGE; FREE-RIDING; LONG-TERM INTEGRITY; MULTIPLE NETWORKS; NEW SOLUTIONS; P2P NETWORK; P2P SYSTEM; PEER TO PEER; PROBABILISTIC GUARANTEES; REMOTE DATA; REPLICATION TECHNIQUES; SECURITY PROPERTIES; VERIFICATION PROTOCOL;

EID: 84858611385     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-011-0117-3     Document Type: Article
Times cited : (7)

References (34)
  • 10
    • 47849089563 scopus 로고    scopus 로고
    • Demonstrating data possession and uncheatable data transfer
    • Report 2006/150, 2006
    • Filho LDG, Barreto PSLM (2006) Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006. http://eprint. iacr. org.
    • (2006) Cryptology ePrint Archive
    • Filho, L.D.G.1    Barreto, P.S.L.M.2
  • 11
    • 84919877604 scopus 로고    scopus 로고
    • Cryptographic primitives enforcing communication and storage complexity
    • 2002
    • Golle P, Jarecki S, Mironov I (2002) Cryptographic primitives enforcing communication and storage complexity. In Proceeding of financial cryptography, 120-135, 2002.
    • (2002) Proceeding of financial cryptography , pp. 120-135
    • Golle, P.1    Jarecki, S.2    Mironov, I.3
  • 12
    • 57049139969 scopus 로고    scopus 로고
    • PORs: proofs of retrievability for large files
    • June 2007. Report 2007/243
    • Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. Cryptology ePrint archive, June 2007. Report 2007/243.
    • (2007) Cryptology ePrint archive
    • Juels, A.1    Kaliski, B.S.2
  • 13
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • 1987
    • Koblitz N (1987) Elliptic curve cryptosystems. Mathematics of computation, vol 48, 203-209, 1987.
    • (1987) Mathematics of computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 20
    • 44349160835 scopus 로고    scopus 로고
    • Securing ad hoc storage through probabilistic cooperation assessment
    • 3rd Workshop on Cryptography for Ad hoc Networks, July 8th, 2007, Wroclaw, Poland, N°2, May 26, 2008
    • Oualha N, Roudier Y (2007) Securing ad hoc storage through probabilistic cooperation assessment. 3rd Workshop on Cryptography for Ad hoc Networks, July 8th, 2007, Wroclaw, Poland. Electronic notes in theoretical computer science, vol 192, N°2, May 26, 2008, pp 17-29.
    • (2007) Electronic notes in theoretical computer science , vol.192 , pp. 17-29
    • Oualha, N.1    Roudier, Y.2
  • 30
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for data storage security in cloud computing
    • San Diego, California, USA, March 14-19, 2010
    • Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In Proceedings of the 29th conference on information communications, San Diego, California, USA, 525-533, March 14-19, 2010.
    • (2010) Proceedings of the 29th conference on information communications , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 31


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.