-
1
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," Computer Security-ESORICS 2009, pp. 355-370, 2009.
-
(2009)
Computer Security-ESORICS
, vol.2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
5
-
-
74049121230
-
Dynamic provable data possession
-
ACM
-
C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 213-222.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
6
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
ACM
-
K.D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: Theory and implementation," in Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 43-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
7
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM
-
G. Ateniese, R. Di Pietro, L.V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, p. 9.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks
, pp. 9
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
8
-
-
84946840347
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," Advances in CryptologylASIACRYPT 2001, pp. 514-532, 2001.
-
(2001)
Advances in CryptologylASIACRYPT
, vol.2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
9
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
Springer
-
R. Merkle, "A digital signature based on a conventional encryption function," in Advances in Cryptology CRYPTO87. Springer, 2006, pp. 369-378.
-
(2006)
Advances in Cryptology CRYPTO87
, pp. 369-378
-
-
Merkle, R.1
-
11
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
IEEE
-
B. Gassend, G.E. Suh, D. Clarke, M. Van Dijk, and S. Devadas, "Caches and hash trees for efficient memory integrity verification," in High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings. The Ninth International Symposium on. IEEE, 2003, pp. 295-306.
-
(2003)
High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings. the Ninth International Symposium on
, pp. 295-306
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
12
-
-
77954389178
-
Online certification status verification with a red-black hash tree
-
H. Kikuchi, K. Abe, and S. Nakanishi, "Online certification status verification with a red-black hash tree," IPSJ Digital Courier, vol. 2, no. 0, pp. 513-523, 2006.
-
(2006)
IPSJ Digital Courier
, vol.2
, pp. 513-523
-
-
Kikuchi, H.1
Abe, K.2
Nakanishi, S.3
-
13
-
-
0033733822
-
Certificate revocation and certificate update
-
M. Naor and K. Nissim, "Certificate revocation and certificate update," Selected Areas in Communications, IEEE Journal on, vol. 18, no. 4, pp. 561-570, 2000.
-
(2000)
Selected Areas in Communications, IEEE Journal on
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
|