-
1
-
-
21044449695
-
Persistent Authenticated Dictionaries and Their Applications
-
Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 379-393. Springer, Heidelberg (2001) (Pubitemid 33354319)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2200
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS 2007. ACM (2007)
-
(2007)
CCS 2007
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM
-
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: SecureComm 2008, pp. 9:1-9:10. ACM (2008)
-
(2008)
SecureComm 2008
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
4
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
7
-
-
84874296531
-
On verifying dynamic multiple data copies over cloud servers
-
Technical report, Report 2011/447
-
Barsoum, A., Hasan, M.: On verifying dynamic multiple data copies over cloud servers. Technical report, Cryptology ePrint Archive, Report 2011/447 (2011)
-
(2011)
Cryptology ePrint Archive
-
-
Barsoum, A.1
Hasan, M.2
-
8
-
-
0028482823
-
Checking the correctness of memories
-
Blum, M., Evans, W., Gemmell, P., Kannan, S., Naor, M.: Checking the correctness of memories. Algorithmica 12(2), 225-244 (1994)
-
(1994)
Algorithmica
, vol.12
, Issue.2
, pp. 225-244
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
9
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
ACM
-
Bowers, K., Juels, A., Oprea, A.: Hail: A high-availability and integrity layer for cloud storage. In: CCS 2009, pp. 187-198. ACM (2009)
-
(2009)
CCS 2009
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Oprea, A.3
-
10
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
ACM
-
Bowers, K.D., van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: How to tell if your cloud files are vulnerable to drive crashes. In: CCS 2011. ACM (2011)
-
(2011)
CCS 2011
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
11
-
-
0345490611
-
Incremental multiset hash functions and their application to memory integrity checking
-
Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
-
Clarke, D., Devadas, S., van Dijk, M., Gassend, B., Suh, G.E.: Incremental multiset hash functions and their application to memory integrity checking. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 188-207. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 188-207
-
-
Clarke, D.1
Devadas, S.2
Van Dijk, M.3
Gassend, B.4
Suh, G.E.5
-
12
-
-
51849117195
-
Multiple-replica provable data possession
-
IEEE
-
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: Mr-pdp: Multiple-replica provable data possession. In: ICDCS 2008, pp. 411-420. IEEE (2008)
-
(2008)
ICDCS 2008
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.M.-P.4
-
13
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
70350630627
-
How efficient can memory checking be?
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dwork, C., Naor, M., Rothblum, G.N., Vaikuntanathan, V.: How efficient can memory checking be? In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 503-520. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 503-520
-
-
Dwork, C.1
Naor, M.2
Rothblum, G.N.3
Vaikuntanathan, V.4
-
15
-
-
74049121230
-
Dynamic provable data possession
-
ACM
-
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: CCS 2009, pp. 213-222. ACM (2009)
-
(2009)
CCS 2009
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
16
-
-
84879849228
-
Transparent, distributed, and replicated dynamic provable data possession
-
Report
-
Etemad, M., Küpçü, A.: Transparent, distributed, and replicated dynamic provable data possession. Cryptology ePrint Archive, Report (2013)
-
(2013)
Cryptology ePrint Archive
-
-
Etemad, M.1
Küpçü, A.2
-
17
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
ACM, New York
-
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: CCS 2007, pp. 584-597. ACM, New York (2007)
-
(2007)
CCS 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
18
-
-
33748605569
-
Complexity of online memory checking
-
Naor, M., Rotblum, G.: Complexity of online memory checking. In: FOCS (2005)
-
(2005)
FOCS
-
-
Naor, M.1
Rotblum, G.2
-
19
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
Sebé, F., Ferrer, J.D., Ballesté, A.M., Deswarte, Y., Quisquater, J.: Efficient remote data possession checking in critical information infrastructures. In: TKDE 2008 (2008)
-
(2008)
TKDE 2008
-
-
Sebé, F.1
Ferrer, J.D.2
Ballesté, A.M.3
Deswarte, Y.4
Quisquater, J.5
-
20
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
22
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
23
-
-
57049170853
-
Publicly verifiable remote data integrity
-
Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
-
Zeng, K.: Publicly verifiable remote data integrity. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 419-434. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 419-434
-
-
Zeng, K.1
-
24
-
-
84863393973
-
Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems
-
Zhao, L., Ren, Y., Xiang, Y., Sakurai, K.: Fault-tolerant scheduling with dynamic number of replicas in heterogeneous systems. In: HPCC 2010, pp. 434-441 (2010)
-
(2010)
HPCC 2010
, pp. 434-441
-
-
Zhao, L.1
Ren, Y.2
Xiang, Y.3
Sakurai, K.4
-
26
-
-
84879859758
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
(PrePrints)
-
Zhu, Y., Hu, H., Ahn, G.-J., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE TPDS 99(PrePrints) (2012)
-
(2012)
IEEE TPDS
, pp. 99
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.-J.3
Yu, M.4
-
27
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
ACM, New York
-
Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Efficient provable data possession for hybrid clouds. In: CCS 2010, pp. 756-758. ACM, New York (2010)
-
(2010)
CCS 2010
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
|