-
1
-
-
84858201794
-
Secure and efficient proof of storage with deduplication
-
Zheng, Q., Xu, S.: Secure and efficient proof of storage with deduplication. In: Proc. CODASPY 2012, pp. 1-12 (2012)
-
(2012)
Proc. CODASPY 2012
, pp. 1-12
-
-
Zheng, Q.1
Xu, S.2
-
2
-
-
84880774036
-
Secure deduplication on mobile devices
-
Marques, L., Costa, C.J.: Secure deduplication on mobile devices. In: Proc. OSDOC 2011, pp. 16-29 (2011)
-
(2011)
Proc. OSDOC 2011
, pp. 16-29
-
-
Marques, L.1
Costa, C.J.2
-
3
-
-
70349237760
-
Secure data deduplication
-
Storer, M.W., Greenan, K., Long, D.D., Miller, E.L.: Secure data deduplication. In: Proc. StorageSS 2008, pp. 1-10 (2008)
-
(2008)
Proc. StorageSS 2008
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
4
-
-
84900490028
-
Secure Cloud Storage with Encrypted Data using File-Based Authentication
-
Xu, J., Chang, E., Zhou, J.: Secure Cloud Storage with Encrypted Data using File-Based Authentication. In: IACR (2011), http://eprint.iacr.org/2011/538.pdf
-
(2011)
IACR
-
-
Xu, J.1
Chang, E.2
Zhou, J.3
-
5
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control
-
Rahumed, A., Chen, H.C.H., Tang, Y., Lee, P.P.C., Lui, J.C.S.: A secure cloud backup system with assured deletion and version control. In: Proc. ICPPW 2011, pp. 160-167 (2011)
-
(2011)
Proc. ICPPW 2011
, pp. 160-167
-
-
Rahumed, A.1
Chen, H.C.H.2
Tang, Y.3
Lee, P.P.C.4
Lui, J.C.S.5
-
6
-
-
85094658894
-
Fast and Secure Laptop Backups with Encrypted De-duplication
-
Anderson, P., Zhang, L.: Fast and Secure Laptop Backups with Encrypted De-duplication. In: Proc. LISA 2010, pp. 29-40 (2010)
-
(2010)
Proc. LISA 2010
, pp. 29-40
-
-
Anderson, P.1
Zhang, L.2
-
7
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proc. ICDCS 2002, pp. 617-624 (2002)
-
(2002)
Proc. ICDCS 2002
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
8
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Security & Privacy 8(6), 40-47 (2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
9
-
-
85050160774
-
Probabilistic encryption & how to play mental poker keeping secret all partial information
-
Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Annual ACM Symposium on Theory of Computing (1982)
-
(1982)
Annual ACM Symposium on Theory of Computing
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
34548110786
-
The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010
-
In: March
-
Gantz, J.F., et al.: The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010. In: IDC (March 2007)
-
(2007)
IDC
-
-
Gantz, J.F.1
-
11
-
-
57349192776
-
Evaluating the usefulness of content addressable storage for high-performance data intensive applications
-
In: Boston, MA, USA
-
Nath, P., Urgaonkar, B., Sivasubramaniam, A.: Evaluating the usefulness of content addressable storage for high-performance data intensive applications. In: Proceedings of the 17th International Symposium on High Performance Distributed Computing, Boston, MA, USA (2008)
-
(2008)
Proceedings of the 17th International Symposium on High Performance Distributed Computing
-
-
Nath, P.1
Urgaonkar, B.2
Sivasubramaniam, A.3
-
12
-
-
33745213464
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
In: February
-
Green, M., Hohenberger, S., Ateniese, G., Fu, K.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium, NDSS (February 2005)
-
(2005)
Proceedings of the 12th Annual Network and Distributed System Security Symposium, NDSS
-
-
Green, M.1
Hohenberger, S.2
Ateniese, G.3
Fu, K.4
-
13
-
-
38049061546
-
Identity-Based Proxy Re-encryption
-
Springer, Heidelberg, In: Katz, J., Yung, M. (eds.)
-
Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
ACNS 2007. LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
14
-
-
84957718934
-
Divertible Protocols and Atomic Proxy Cryptography
-
Springer, Heidelberg, In: Nyberg, K. (ed.)
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
EUROCRYPT 1998. LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.J.3
-
15
-
-
85066881368
-
Avoiding the Disk Bottleneck in the Data Domain Deduplication File System
-
In: February
-
Zhu, B., Li, K., Patterson, H.: Avoiding the Disk Bottleneck in the Data Domain Deduplication File System. In: Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST 2008), pp. 269-282 (February 2008)
-
(2008)
Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST 2008)
, pp. 269-282
-
-
Zhu, B.1
Li, K.2
Patterson, H.3
-
16
-
-
58049182904
-
ADMAD: Application-Driven Metadata Aware Deduplication Archival Storage System
-
In: MSST 2008
-
Liu, C., Lu, Y., Du, D., Wang, D.: ADMAD: Application-Driven Metadata Aware Deduplication Archival Storage System. In: International Workshop on Storage Network Architecture and Parallel I/Os (SNAPI 2008) Held In Conjunction with the 25th IEEE Conference on Mass Storage Systems and Technologies, MSST 2008 (2008)
-
(2008)
International Workshop on Storage Network Architecture and Parallel I/Os (SNAPI 2008) Held In Conjunction with the 25th IEEE Conference on Mass Storage Systems and Technologies
-
-
Liu, C.1
Lu, Y.2
Du, D.3
Wang, D.4
-
17
-
-
70450060162
-
R-ADMAD: High reliability provision for large-scale de-duplication archival storage systems
-
In: June
-
Liu, C., et al.: R-ADMAD: High reliability provision for large-scale de-duplication archival storage systems. In: Proceedings of the 23rd International Conference on Supercomputing, pp. 370-379 (June 2009)
-
(2009)
Proceedings of the 23rd International Conference on Supercomputing
, pp. 370-379
-
-
Liu, C.1
-
18
-
-
58549086614
-
Type-Based Proxy Re-encryption and Its Construction
-
Springer, Heidelberg, In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.)
-
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Type-Based Proxy Re-encryption and Its Construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130-144. Springer, Heidelberg (2008)
-
(2008)
INDOCRYPT 2008. LNCS
, vol.5365
, pp. 130-144
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
19
-
-
0034206002
-
Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol
-
Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking 8(3), 281-293 (2000)
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
20
-
-
63049083812
-
Secure sockets layer
-
Weaver, A.C.: Secure sockets layer. Computer 39(4), 88-90 (2006)
-
(2006)
Computer
, vol.39
, Issue.4
, pp. 88-90
-
-
Weaver, A.C.1
|