-
1
-
-
79960839401
-
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
-
G. Wang, Q. Liu, J. Wu, and M. Guo Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers Comput. Secur. 30 5 2011 320 331
-
(2011)
Comput. Secur.
, vol.30
, Issue.5
, pp. 320-331
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
Guo, M.4
-
2
-
-
80051514746
-
Achieving fine-grained access control for secure data sharing on cloud servers
-
G. Wang, Q. Liu, and J. Wu Achieving fine-grained access control for secure data sharing on cloud servers Concurr. Comput. 23 12 2011 1443 1464
-
(2011)
Concurr. Comput.
, vol.23
, Issue.12
, pp. 1443-1464
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
3
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Vanish: Increasing data privacy with self-destructing data, in: Proc. of the 18th USENIX Security Symposium, 2009.
-
(2009)
Proc. of the 18th USENIX Security Symposium
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.3
Levy, H.M.4
-
4
-
-
34547246049
-
The origins of cryptology: The Arab contributions
-
I.A. Al-Kindi The origins of cryptology: The Arab contributions Cryptologia 16 2 1992 97 126
-
(1992)
Cryptologia
, vol.16
, Issue.2
, pp. 97-126
-
-
Al-Kindi, I.A.1
-
5
-
-
79951787208
-
Data self-destruction method
-
Z. Lu, T. Li, X. Hu, K. Zhao, J. Zeng, and L. Peng Data self-destruction method Appl. Res. Comput. 26 1 2009 350 355
-
(2009)
Appl. Res. Comput.
, vol.26
, Issue.1
, pp. 350-355
-
-
Lu, Z.1
Li, T.2
Hu, X.3
Zhao, K.4
Zeng, J.5
Peng, L.6
-
6
-
-
76349111100
-
Research on secure destruction of digital information
-
H. Dong, S. Kun, C. Yu, Research on secure destruction of digital information, in: Proc. of 2009 International Conference on Apperceiving Computing and Intelligence Analysis, 2009, pp. 356-359.
-
(2009)
Proc. of 2009 International Conference on Apperceiving Computing and Intelligence Analysis
, pp. 356-359
-
-
Dong, H.1
Kun, S.2
Yu, C.3
-
7
-
-
51949085264
-
Secure deletion of confidential data in consumer electronics
-
K. Sun, J. Choi, D. Lee, S. Noh, Secure deletion of confidential data in consumer electronics, in: Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2008, pp. 385-386.
-
(2008)
Digest of Technical Papers - IEEE International Conference on Consumer Electronics
, pp. 385-386
-
-
Sun, K.1
Choi, J.2
Lee, D.3
Noh, S.4
-
8
-
-
36349001779
-
A hybrid PKI-IBC based ephemerizer system
-
S.K. Nair, M.T. Dashti, B. Crispo, A.S. Tanenbaum, A hybrid PKI-IBC based ephemerizer system, in: Proc. of International Information Security Conference, 2007, pp. 241-252.
-
(2007)
Proc. of International Information Security Conference
, pp. 241-252
-
-
Nair, S.K.1
Dashti, M.T.2
Crispo, B.3
Tanenbaum, A.S.4
-
9
-
-
36348954757
-
The ephemerizer: Making data disappear
-
R. Perlman The ephemerizer: making data disappear J. Inf. Syst. Secur. 1 1 2005 21 32
-
(2005)
J. Inf. Syst. Secur.
, vol.1
, Issue.1
, pp. 21-32
-
-
Perlman, R.1
-
13
-
-
84871057210
-
-
Cloud computing could cause the cryptography to collapse
-
Cloud computing could cause the cryptography to collapse http://cloud.csdn.net/a/20100426/263996.html 2010
-
(2010)
-
-
-
14
-
-
79951805169
-
A secure self-destructing scheme for electronic data
-
F. Yue, G. Wang, Q. Liu, A secure self-destructing scheme for electronic data, in: Proc. of IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom), 2010, pp. 651-658.
-
(2010)
Proc. of IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom)
, pp. 651-658
-
-
Yue, F.1
Wang, G.2
Liu, Q.3
-
16
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
P. Maymounkov, D. Mazieres, Kademlia: A peer-to-peer information system based on the XOR metric, in: Proc. of Peer-to-Peer Systems, 2002, pp. 53-65.
-
(2002)
Proc. of Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
17
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
A. Rowstron, and P. Druschel Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems Lecture Notes in Comput. Sci. vol. 2218 2001 329 350
-
(2001)
Lecture Notes in Comput. Sci.
, vol.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
18
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for Internet applications
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proc. of ACM SIGCOMM, 2001, pp. 149-160.
-
(2001)
Proc. of ACM SIGCOMM
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
19
-
-
84871045275
-
-
Azureus
-
Azureus http://www.vuze.com/
-
-
-
-
20
-
-
33847324622
-
OpenDHT: A public DHT service and its uses
-
S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, H. Yu, OpenDHT: A public DHT service and its uses, in: Proc. of ACM SIGCOMM, 2005, pp. 73-84.
-
(2005)
Proc. of ACM SIGCOMM
, pp. 73-84
-
-
Rhea, S.1
Godfrey, B.2
Karp, B.3
Kubiatowicz, J.4
Ratnasamy, S.5
Shenker, S.6
Stoica, I.7
Yu, H.8
-
21
-
-
42149083231
-
Profiling a million user DHT
-
J. Falkner, M. Piatek, J. John, A. Krishnamurthy, T. Anderson, Profiling a million user DHT, in: Proc. of Internet Measurement Conference, 2007, pp. 129-134.
-
(2007)
Proc. of Internet Measurement Conference
, pp. 129-134
-
-
Falkner, J.1
Piatek, M.2
John, J.3
Krishnamurthy, A.4
Anderson, T.5
-
22
-
-
21644443485
-
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
-
K.P. Gummadi, R.J. Dunn, S. Saroiu, S.D. Gribble, H.M. Levy, J. Zahorjan, Measurement, modeling, and analysis of a peer-to-peer file-sharing workload, in: Proc. of SOSP, 2003, pp. 314-329.
-
(2003)
Proc. of SOSP
, pp. 314-329
-
-
Gummadi, K.P.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
23
-
-
84871034887
-
-
Lagrange polynomial
-
Lagrange polynomial http://en.wikipedia.org/wiki/Lagrange-polynomial
-
-
-
-
24
-
-
84871035513
-
-
Hash function
-
Hash function http://en.wikipedia.org/wiki/Hash-function
-
-
-
-
25
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun. ACM 22 11 1979 612 613
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|