-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in CCS '07, 2007, pp. 598-609.
-
CCS '07, 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
57049170853
-
Publicly verifiable remote data integrity
-
Proceedings of the 10th Int. Conference on Information and Communications Security, ser.
-
K. Zeng, "Publicly verifiable remote data integrity," in Proceedings of the 10th Int. Conference on Information and Communications Security, ser. ICICS '08, 2008, pp. 419-434.
-
ICICS '08, 2008
, pp. 419-434
-
-
Zeng, K.1
-
3
-
-
84902475228
-
Remote integrity checking
-
Y. Deswarte, J.-J. Quisquater, and A. Saïdane, "Remote integrity checking," in 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), 2003, pp. 1-11.
-
6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), 2003
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.-J.2
Saïdane, A.3
-
4
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
ePrint Archive, Report 2006/150
-
D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," Cryptology ePrint Archive, Report 2006/150, 2006.
-
(2006)
Cryptology
-
-
Filho, D.L.G.1
Barreto, P.S.L.M.2
-
5
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
F. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures,"IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, 2008.
-
(2008)
IEEE Trans. on Knowl. and Data Eng.
, vol.20
, Issue.8
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.-J.5
-
6
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
ePrint Archive, Report 2008/186
-
M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008.
-
(2008)
Cryptology
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
7
-
-
33747176236
-
Authentication and integrity in outsourced databases
-
E. Mykletun, M. Narasimha, and G. Tsudik, "Authentication and integrity in outsourced databases," Trans. Storage, vol. 2, no. 2, 2006.
-
(2006)
Trans. Storage
, vol.2
, Issue.2
-
-
Mykletun, E.1
Narasimha, M.2
Tsudik, G.3
-
9
-
-
51849117195
-
MRPDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MRPDP: multiple-replica provable data possession," in 28th IEEE ICDCS, 2008, pp. 411-420.
-
28th IEEE ICDCS, 2008
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
10
-
-
57049174560
-
Compact proofs of retrievability
-
ePrint Archive, Report 2008/073
-
H. Shacham and B. Waters, "Compact proofs of retrievability, "Cryptology ePrint Archive, Report 2008/073, 2008.
-
(2008)
Cryptology
-
-
Shacham, H.1
Waters, B.2
-
11
-
-
74049103479
-
PORs: Proofs of Retrievability for large files
-
A. Juels and B. S. Kaliski, "PORs: Proofs of Retrievability for large files," in CCS'07, 2007, pp. 584-597.
-
CCS'07, 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
12
-
-
70349245590
-
Robust remote data checking
-
R. Curtmola, O. Khan, and R. Burns, "Robust remote data checking," in StorageSS '08, 2008, pp. 63-68.
-
StorageSS '08, 2008
, pp. 63-68
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
13
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation," in CCSW '09, 2009, pp. 43-54.
-
CCSW '09, 2009
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
14
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of retrievability via hardness amplification," in TCC '09, 2009, pp. 109-127.
-
TCC '09, 2009
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
15
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea, "Hail: a high-availability and integrity layer for cloud storage," in CCS '09, 2009, pp. 187-198.
-
CCS '09, 2009
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
16
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
G. Ateniese, S. Kamara, and J. Katz, "Proofs of storage from homomorphic identification protocols," in ASIACRYPT '09, 2009, pp. 319-333.
-
ASIACRYPT '09, 2009
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
17
-
-
70349373534
-
An introduction to pairing-based cryptography
-
Online at
-
A. Menezes, "An introduction to pairing-based cryptography, "Lecture Notes 2005, Online at http://www.math.uwaterloo.ca/~ajmeneze/ publications/pairings.pdf.
-
(2005)
Lecture Notes
-
-
Menezes, A.1
-
19
-
-
0035336179
-
New explicit conditions of elliptic curve traces for "fr- reduction"
-
A. Miyaji, M. Nakabayashi, and S. TAKANO, "New explicit conditions of elliptic curve traces for "fr-reduction"," IEICE Transactions on fundamental, pp. 1234-1243, 2001.
-
(2001)
IEICE Transactions on Fundamental
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|