-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. Provable data possession at untrusted stores. In CCS '07: ACM conference on Computer and communications security, pages 598-609, 2007.
-
(2007)
CCS '07: ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
5
-
-
80051984165
-
Leftover Hash Lemma
-
Revisited
-
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, and Yu Yu. Leftover Hash Lemma, Revisited. In CRYPTO, pages 1-20, 2011.
-
(2011)
CRYPTO
, pp. 1-20
-
-
Barak, B.1
Dodis, Y.2
Krawczyk, H.3
Pereira, O.4
Pietrzak, K.5
Standaert, F.-X.6
Yu, Y.7
-
6
-
-
84860577964
-
On the (im)possibility of obfuscating programs
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im)possibility of obfuscating programs. J. ACM, 59(2):6:1-6:48, 2012.
-
(2012)
J. ACM
, vol.59
, Issue.2
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
7
-
-
84877996375
-
Message-locked encryption and secure deduplication
-
Report 2012/631
-
Mihir Bellare, Sriram Keelveedhi, and Thomas Ristenpart. Message-locked encryption and secure deduplication. Cryptology ePrint Archive, Report 2012/631, 2012. http://eprint.iacr.org/.
-
(2012)
Cryptology ePrint Archive
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
12
-
-
33244469997
-
Key management for multi-user encrypted databases
-
Ernesto Damiani, S. De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. Key management for multi-user encrypted databases. In StorageSS '05: Proceedings of ACM workshop on Storage security and survivability, pages 74-83, 2005.
-
(2005)
StorageSS '05: Proceedings of ACM Workshop on Storage Security and Survivability
, pp. 74-83
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
13
-
-
52149117439
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput., 38(1):97-139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
14
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
John Douceur, Atul Adya, William Bolosky, Dan Simon, and Marvin Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In ICDCS '02: International Conference on Distributed Computing Systems, 2002.
-
ICDCS '02: International Conference on Distributed Computing Systems, 2002
-
-
Douceur, J.1
Adya, A.2
Bolosky, W.3
Simon, D.4
Theimer, M.5
-
15
-
-
84877988399
-
Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
-
US Patent 7266689
-
John Douceur, William Bolosky, and Marvin Theimer. US Patent 7266689: Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys, 2007.
-
(2007)
-
-
Douceur, J.1
Bolosky, W.2
Theimer, M.3
-
17
-
-
84877932882
-
-
Dropship. April
-
Dropship. Dropbox api utilities, April 2011. https://github.com/ driverdan/dropship.
-
(2011)
Dropbox Api Utilities
-
-
-
20
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Shai Halevi, Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg. Proofs of ownership in remote storage systems. In CCS '11: ACM conference on Computer and communications security, pages 491-500, 2011. http://eprint.iacr. org/2011/207.
-
(2011)
CCS '11: ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
21
-
-
78650053109
-
Side Channels in Cloud Services: Deduplication in Cloud Storage
-
Shulman-Peleg A. Harnik D., Pinkas B. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security and Privacy Magazine, special issue of Cloud Security, 8(6), 2010.
-
(2010)
IEEE Security and Privacy Magazine, Special Issue of Cloud Security
, vol.8
, Issue.6
-
-
Shulman-Peleg, A.1
Harnik, D.2
Pinkas, B.3
-
25
-
-
84877956966
-
-
Microsoft. Microsoft Services Agreement. http://windows.microsoft.com/en- US/windows-live/microsoft-service-agreement.
-
Microsoft Services Agreement
-
-
-
26
-
-
84860006920
-
Incremental deterministic public-key encryption
-
Ilya Mironov, Omkant Pandey, Omer Reingold, and Gil Segev. Incremental deterministic public-key encryption. In EUROCRYPT '12: Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, pages 628-644, 2012.
-
(2012)
EUROCRYPT '12: Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques
, pp. 628-644
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Segev, G.4
-
29
-
-
84877952120
-
-
NIST. National Institute of Standards and Technology. Secure hash standard (SHS). 180-2, August
-
NIST. National Institute of Standards and Technology. Secure hash standard (SHS). FIPS 180-2, August 2002.
-
(2002)
FIPS
-
-
-
31
-
-
84873848488
-
-
OpenSSL. OpenSSL Project. http://www.openssl.org/.
-
OpenSSL Project
-
-
-
33
-
-
58349118819
-
Compact Proofs of Retrievability
-
Hovav Shacham and Brent Waters. Compact Proofs of Retrievability. In ASIACRYPT '08, pages 90-107, 2008.
-
(2008)
ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
36
-
-
70349237760
-
Secure Data Deduplication
-
Mark Storer, Kevin Greenan, Darrell Long, and Ethan Miller. Secure Data Deduplication. In StorageSS '08: ACM international workshop on Storage security and survivability, pages 1-10, 2008.
-
(2008)
StorageSS '08: ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.1
Greenan, K.2
Long, D.3
Miller, E.4
-
37
-
-
84877992235
-
-
Twitter
-
Twitter. Tweetdeck. http://money.cnn.com/2012/03/30/technology/tweetdeck- bug-twitter/.
-
Tweetdeck
-
-
-
38
-
-
0019572642
-
NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITY
-
DOI 10.1016/0022-0000(81)90033-7
-
Mark Wegman and Larry Carter. New Hash Functions and Their Use in Authentication and Set Equality. J. Comput. Syst. Sci., pages 265-279, 1981. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter J.Lawrence2
-
42
-
-
84877953172
-
Leakage-resilient client-side deduplication of encrypted data in cloud storage
-
Report 2011/538
-
Jia Xu, Ee-Chien Chang, and Jianying Zhou. Leakage-resilient client-side deduplication of encrypted data in cloud storage. Cryptology ePrint Archive, Report 2011/538, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology ePrint Archive
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
|