-
4
-
-
85076461050
-
-
April 19th
-
Grab the pitchforks!. again, retrieved April 19th, 2011. Online at http://benlog.com/articles/2011/04/19/grab-the-pitchforksagain/.
-
(2011)
Grab the Pitchforks!. Again, Retrieved
-
-
-
6
-
-
85076483375
-
-
June 1st
-
NCrypto Homepage, retrieved June 1st, 2011. Online at http://ncrypto.sourceforge.net/.
-
(2011)
NCrypto Homepage, Retrieved
-
-
-
7
-
-
85076495234
-
-
Piratebay top 100. Online at http://thepiratebay.org/top/all.
-
Piratebay Top 100
-
-
-
8
-
-
84882750204
-
An analysis of private browsing modes in modern browsers
-
AGGARWAL, G., BURSZTEIN, E., JACKSON, C., AND BONEH, D. An analysis of private browsing modes in modern browsers. In Proceedings of the 19th USENIX conference on Security (2010), USENIX Security'10.
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security'10
-
-
Aggarwal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
9
-
-
77950347409
-
A view of cloud computing
-
ARMBRUST, M., FOX, A., GRIFFITH, R., JOSEPH, A. D., KATZ, R., KONWINSKI, A., LEE, G., PATTERSON, D., RABKIN, A., STOICA, I., AND ZAHARIA, M. A view of cloud computing. Communications of the ACM 53, 4 (2010), 50-58.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
10
-
-
79959823910
-
Remote data checking using provable data possession
-
ATENIESE, G., BURNS, R., CURTMOLA, R., HERRING, J., KHAN, O., KISSNER, L., PETERSON, Z., AND SONG, D. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC) 14, 1 (2011), 12.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
11
-
-
74049102823
-
Provable data possession at untrusted stores
-
ATENIESE, G., BURNS, R., CURTMOLA, R., HERRING, J., KISSNER, L., PETERSON, Z., AND SONG, D. Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on Computer and communications security (2007), CCS '07, ACM, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
12
-
-
70249129465
-
Scalable and efficient provable data possession
-
ATENIESE, G., DI PIETRO, R., MANCINI, L., AND TSUDIK, G. Scalable and Efficient Provable Data Possession. In Proceedings of the 4th international conference on Security and privacy in communication netowrks (2008), ACM, pp. 1-10.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 1-10
-
-
Ateniese, G.1
Pietro, D.I.R.2
Mancini, L.3
Tsudik, G.4
-
13
-
-
74049144464
-
HAIL: A highavailability and integrity layer for cloud storage
-
BOWERS, K., JUELS, A., AND OPREA, A. HAIL: A highavailability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security (2009), ACM, pp. 187-198.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
14
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
BOWERS, K., JUELS, A., AND OPREA, A. Proofs of retrievability: Theory and implementation. In Proceedings of the 2009 ACM workshop on Cloud computing security (2009), ACM, pp. 43-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 43-54
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
16
-
-
14844330726
-
IP covert timing channels: Design and detection
-
CABUK, S., BRODLEY, C. E., AND SHIELDS, C. Ip covert timing channels: Design and detection. In Proceedings of the 11th ACM conference on Computer and communications security (2004), CCS '04, pp. 178-187.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04
, pp. 178-187
-
-
Cabuk, S.1
Brodley, C.E.2
Shields, C.3
-
17
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
CHOW, R., GOLLE, P., JAKOBSSON, M., SHI, E., STADDON, J., MASUOKA, R., AND MOLINA, J. Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security (2009), ACM, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
18
-
-
85076470331
-
-
COX, M., ENGELSCHALL, R., HENSON, S., LAURIE, B., YOUNG, E., AND HUDSON, T. Openssl, 2001.
-
(2001)
Openssl
-
-
Cox, M.1
Engelschall, R.2
Henson, S.3
Laurie, B.4
Young, E.5
Hudson, T.6
-
20
-
-
74049121230
-
Dynamic provable data possession
-
ERWAY, C., KÜPCÜ, A., PAPAMANTHOU, C., AND TAMASSIA, R. Dynamic Provable Data Possession. In Proceedings of the 16th ACM conference on Computer and communications security (2009), ACM, pp. 213-222.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpcü, A.2
Papamanthou, C.3
Tamassia, R.4
-
21
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
GARFINKEL, S., AND SHELAT, A. Remembrance of data passed: A study of disk sanitization practices. Security & Privacy, IEEE 1, 1 (2003), 17-27.
-
(2003)
Security & Privacy, IEEE 1
, vol.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
22
-
-
0003899482
-
-
Microsoft, UC Irvine, Netscape, Novell. Internet Proposed Standard Request for Comments (RFC) 2518
-
GOLAND, Y., WHITEHEAD, E., FAIZI, A., CARTER, S., AND JENSEN, D. HTTP Extensions for Distributed Authoring-WEBDAV. Microsoft, UC Irvine, Netscape, Novell. Internet Proposed Standard Request for Comments (RFC) 2518 (1999).
-
(1999)
HTTP Extensions for Distributed Authoring-WEBDAV
-
-
Goland, Y.1
Whitehead, E.2
Faizi, A.3
Carter, S.4
Jensen, D.5
-
23
-
-
38949169175
-
Cryptree: A folder tree structure for cryptographic file systems
-
GROLIMUND, D., MEISSER, L., SCHMID, S., AND WATTENHOFER, R. Cryptree: A folder tree structure for cryptographic file systems. In Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on (2006), IEEE, pp. 189-198.
-
(2006)
Reliable Distributed Systems, 2006. SRDS'06. 25th IEEE Symposium on
, pp. 189-198
-
-
Grolimund, D.1
Meisser, L.2
Schmid, S.3
Wattenhofer, R.4
-
24
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
HARNIK, D., PINKAS, B., AND SHULMAN-PELEG, A. Side channels in cloud services: Deduplication in cloud storage. Security & Privacy, IEEE 8, 6 (2010), 40-47.
-
(2010)
Security & Privacy, IEEE 8
, vol.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
26
-
-
0012128179
-
HTTP Cookies: Standards, privacy, and politics
-
KRISTOL, D. HTTP Cookies: Standards, privacy, and politics. ACM Transactions on Internet Technology (TOIT) 1, 2 (2001), 151-198.
-
(2001)
ACM Transactions on Internet Technology (TOIT)
, vol.1
, Issue.2
, pp. 151-198
-
-
Kristol, D.1
-
27
-
-
84874544133
-
Challenges and directions for monitoring P2P file sharing networksor: Why my printer received a DMCA takedown notice
-
USENIX Association
-
PIATEK, M., KOHNO, T., AND KRISHNAMURTHY, A. Challenges and directions for monitoring P2P file sharing networksor: why my printer received a DMCA takedown notice. In Proceedings of the 3rd conference on Hot topics in security (2008), USENIX Association, p. 12.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 12
-
-
Piatek, M.1
Kohno, T.2
Krishnamurthy, A.3
-
29
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
SCHWARZ, T., AND MILLER, E. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on (2006), IEEE, p. 12.
-
(2006)
Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on
, pp. 12
-
-
Schwarz, T.1
Miller, E.2
-
31
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Ieee
-
WANG, C., WANG, Q., REN, K., AND LOU, W. Ensuring data storage security in cloud computing. In Quality of Service, 2009. IWQoS. 17th International Workshop on (2009), Ieee, pp. 1-9.
-
(2009)
Quality of Service, 2009. IWQoS. 17th International Workshop on
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
32
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
WANG, Q., WANG, C., LI, J., REN, K., AND LOU, W. Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security-ESORICS 2009 (2010), 355-370.
-
(2010)
Computer Security-ESORICS 2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|