-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J.,Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598-609 (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
2
-
-
51849117195
-
Mr-pdp: Multiple-replica provable data possession
-
IEEE Computer Society
-
Curtmola, R., Khan, O., Burns, R.C., Ateniese, G.: Mr-pdp: Multiple-replica provable data possession. In: ICDCS, pp. 411-420. IEEE Computer Society (2008)
-
(2008)
ICDCS
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.C.3
Ateniese, G.4
-
3
-
-
57049134700
-
Remote Integrity Check with Dishonest Storage Server
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Chang, E.-C., Xu, J.: Remote Integrity Check with Dishonest Storage Server. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 223-237. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 223-237
-
-
Chang, E.-C.1
Xu, J.2
-
4
-
-
72449185582
-
Proofs of Storage from Homomorphic Identification Protocols
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of Storage from Homomorphic Identification Protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
5
-
-
70350681128
-
Proofs of Retrievability via Hardness Amplification
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of Retrievability via Hardness Amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.P.2
Wichs, D.3
-
6
-
-
70350389843
-
Enabling PublicVerifiability and DataDynamics for Storage Security in Cloud Computing
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Q., Wang, C., Li, J., Ren,K., Lou, W.: Enabling PublicVerifiability and DataDynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
7
-
-
74049121230
-
Dynamic provable data possession
-
Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: ACM Conference on Computer and Communications Security, pp. 213-222 (2009)
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
8
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
ACM, New York
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 756-758. ACM, New York (2010)
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
9
-
-
79959823910
-
Remote data checking using provable data possession
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12:1-12:34 (2011)
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
10
-
-
79961227180
-
Provable data possession of resourceconstrained mobile devices in cloud computing
-
Yang, J., Wang, H., Wang, J., Tan, C., Yu, D.: Provable data possession of resourceconstrained mobile devices in cloud computing. JNW 6(7), 1033-1040 (2011)
-
(2011)
JNW
, vol.6
, Issue.7
, pp. 1033-1040
-
-
Yang, J.1
Wang, H.2
Wang, J.3
Tan, C.4
Yu, D.5
-
11
-
-
84871548781
-
Towards efficient provable data possession
-
ePrint Archive 2011
-
Xu, J., Chang, E.C.: Towards efficient provable data possession. IACR Cryptology ePrint Archive 2011, 574 (2011)
-
(2011)
IACR Cryptology
, pp. 574
-
-
Xu, J.1
Chang, E.C.2
-
12
-
-
81055144591
-
Delegable Provable Data Possession for Remote Data in the Clouds
-
Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. Springer, Heidelberg
-
Shen, S.T., Tzeng, W.G.: Delegable Provable Data Possession for Remote Data in the Clouds. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 93-111. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7043
, pp. 93-111
-
-
Shen, S.T.1
Tzeng, W.G.2
-
13
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
ACM, New York
-
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACMConference on Computer and Communications Security, CCS 2007, pp. 584-597. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACMConference on Computer and Communications Security, CCS 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
14
-
-
58349118819
-
Compact Proofs of Retrievability
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
15
-
-
33745855807
-
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Boneh, D., Shen, E., Waters, B.: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 229-240. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 229-240
-
-
Boneh, D.1
Shen, E.2
Waters, B.3
-
16
-
-
78650828289
-
Constant-Size Commitments to Polynomials and Their Applications
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
17
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
-
Naor, M., Pinkas, B.: Efficient Trace and Revoke Schemes. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 1-20. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
|