-
1
-
-
84874913079
-
-
OpenSSL. http://www.openssl.org/.
-
OpenSSL
-
-
-
2
-
-
84874920815
-
-
Wget. http://www.gnu.org/software/wget/.
-
Wget
-
-
-
3
-
-
79959823910
-
Remote data checking using provable data possession
-
June
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song. Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur., 14, June 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proc. of ACM Conference on Computer and Communications Security (CCS '07), 2007.
-
(2007)
Proc. of ACM Conference on Computer and Communications Security (CCS '07)
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
80755144004
-
How to tell if your cloud-les are vulnerable to drive crashes
-
K. D. Bowers, M. V. Dijk, A. Juels, A. Oprea, and R. L. Rivest. How to tell if your cloud -les are vulnerable to drive crashes. In Proc. of ACM Conference on Computer and Communications Security (CCS '11), 2011.
-
(2011)
Proc. of ACM Conference on Computer and Communications Security (CCS '11)
-
-
Bowers, K.D.1
Dijk, M.V.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
13
-
-
77955726417
-
Network coding for distributed storage systems
-
Sept.
-
A. G. Dimakis, P. B. Godfrey, Y. Wu, M. O. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. IEEE Trans. on Inf. Theory, 56, Sept. 2010.
-
(2010)
IEEE Trans. on Inf. Theory
, vol.56
-
-
Dimakis, A.G.1
Godfrey, P.B.2
Wu, Y.3
Wainwright, M.O.4
Ramchandran, K.5
-
18
-
-
71649098102
-
Making peer-assisted content distribution robust to collusion using bandwidth puzzles
-
M. K. Reiter, V. Sekar, C. Spensky, and Z. Zhang. Making peer-assisted content distribution robust to collusion using bandwidth puzzles. Information Systems Security, pages 132{147, 2009.
-
(2009)
Information Systems Security
, pp. 132-147
-
-
Reiter, M.K.1
Sekar, V.2
Spensky, C.3
Zhang, Z.4
-
25
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. on Parallel and Distributed Syst., 22(5), May 2011.
-
(2011)
IEEE Trans. on Parallel and Distributed Syst.
, vol.22
, Issue.5
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
26
-
-
84869808633
-
Lost: Location based storage
-
G. J. Watson, R. Safavi-Naini, M. Alimomeni, M. E. Locasto, and S. Narayan. Lost: location based storage. In Proc. of ACM Cloud Computing Security Workshop (CCSW '12), 2012.
-
(2012)
Proc. of ACM Cloud Computing Security Workshop (CCSW '12)
-
-
Watson, G.J.1
Safavi-Naini, R.2
Alimomeni, M.3
Locasto, M.E.4
Narayan, S.5
-
27
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22(3):265 { 279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|