-
6
-
-
84883387905
-
-
Google Drive, http://drive.google.com/
-
-
-
-
7
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., Wattenhofer, R.: Farsite: Federated, available, and reliable storage for an incompletely trusted environment. ACM SIGOPS Operating Systems Review 36(SI), 1-14 (2002)
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
9
-
-
0036292773
-
Streaming computation of combinatorial objects
-
IEEE
-
Bar-Yossef, Z., Reingold, O., Shaltiel, R., Trevisan, L.: Streaming computation of combinatorial objects. In: Proceedings of the 17th IEEE Annual Conference on Computational Complexity, pp. 133-142. IEEE (2002)
-
(2002)
Proceedings of the 17th IEEE Annual Conference on Computational Complexity
, pp. 133-142
-
-
Bar-Yossef, Z.1
Reingold, O.2
Shaltiel, R.3
Trevisan, L.4
-
10
-
-
4544387814
-
-
Unpublished report, MIT Laboratory for Computer Science
-
Batten, C., Barr, K., Saraf, A., Trepetin, S.: pStore: A secure peer-to-peer backup system. Unpublished report, MIT Laboratory for Computer Science (2001)
-
(2001)
PStore: A Secure Peer-to-peer Backup System
-
-
Batten, C.1
Barr, K.2
Saraf, A.3
Trepetin, S.4
-
11
-
-
38149068986
-
Deterministic and efficiently searchable encryption
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535-552. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 535-552
-
-
Bellare, M.1
Boldyreva, A.2
O'Neill, A.3
-
12
-
-
72449189555
-
Hedged public-key encryption: How to protect against bad randomness
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged public-key encryption: How to protect against bad randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Naor, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
13
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society Press October
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS, pp. 394-403. IEEE Computer Society Press (October 1997)
-
(1997)
38th FOCS
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
14
-
-
51849127804
-
Deterministic encryption: Definitional equivalences and constructions without random oracles
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Bellare, M., Fischlin, M., O'Neill, A., Ristenpart, T.: Deterministic encryption: Definitional equivalences and constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 360-378. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 360-378
-
-
Bellare, M.1
Fischlin, M.2
O'Neill, A.3
Ristenpart, T.4
-
15
-
-
84877996375
-
Message-locked encryption and secure deduplication
-
Report 2012/631
-
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. Cryptology ePrint Archive, Report 2012/631 (2012), http://eprint.iacr.org/
-
(2012)
Cryptology EPrint Archive
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
16
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Ashby, V. (ed.) ACM Press November
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62-73. ACM Press (November 1993)
-
(1993)
ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
DOI 10.1007/11761679-25, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006) (Pubitemid 44072253)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
ACM
-
Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 103-112. ACM (1988)
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
19
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Boldyreva, A., Fehr, S., O'Neill, A.: On notions of security for deterministic encryption, and efficient constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335-359. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'Neill, A.3
-
20
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
21
-
-
80051954284
-
Better security for deterministic public-key encryption: The auxiliary-input setting
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Brakerski, Z., Segev, G.: Better security for deterministic public-key encryption: The auxiliary-input setting. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 543-560. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 543-560
-
-
Brakerski, Z.1
Segev, G.2
-
23
-
-
84978437474
-
Pastiche: Making backup cheap and easy
-
Cox, L.P., Murray, C.D., Noble, B.D.: Pastiche: making backup cheap and easy. SIGOPS Oper. Syst. Rev. 36, 285-298 (2002)
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 285-298
-
-
Cox, L.P.1
Murray, C.D.2
Noble, B.D.3
-
24
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
IEEE
-
Douceur, J., Adya, A., Bolosky, W., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 617-624. IEEE (2002)
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems
, pp. 617-624
-
-
Douceur, J.1
Adya, A.2
Bolosky, W.3
Simon, D.4
Theimer, M.5
-
25
-
-
84858326015
-
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Fuller, B., O'Neill, A., Reyzin, L.: A unified approach to deterministic encryption: New constructions and a connection to computational entropy. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 582-599. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 582-599
-
-
Fuller, B.1
O'Neill, A.2
Reyzin, L.3
-
27
-
-
79953218346
-
Correlated-input secure hash functions
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Goyal, V., O'Neill, A., Rao, V.: Correlated-input secure hash functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 182-200. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 182-200
-
-
Goyal, V.1
O'Neill, A.2
Rao, V.3
-
28
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Chen, Y., Danezis, G., Shmatikov, V. (eds.) ACM Press October
-
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) ACM CCS 2011, pp. 491-500. ACM Press (October 2011)
-
(2011)
ACM CCS 2011
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
29
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy 8(6), 40-47 (2010)
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
30
-
-
84937432504
-
Hyper-encryption against space-bounded adversaries from on-line strong extractors
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
Lu, C.-J.: Hyper-encryption against space-bounded adversaries from on-line strong extractors. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 257-271. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 257-271
-
-
Lu, C.-J.1
-
32
-
-
84860006920
-
Incremental deterministic public-key encryption
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Mironov, I., Pandey, O., Reingold, O., Segev, G.: Incremental deterministic public-key encryption. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 628-644. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 628-644
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Segev, G.4
-
35
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control
-
IEEE
-
Rahumed, A., Chen, H., Tang, Y., Lee, P., Lui, J.: A secure cloud backup system with assured deletion and version control. In: 2011 40th International Conference on Parallel Processing Workshops (ICPPW), pp. 160-167. IEEE (2011)
-
(2011)
2011 40th International Conference on Parallel Processing Workshops (ICPPW)
, pp. 160-167
-
-
Rahumed, A.1
Chen, H.2
Tang, Y.3
Lee, P.4
Lui, J.5
-
36
-
-
79958012441
-
Careful with composition: Limitations of the indifferentiability framework
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with composition: Limitations of the indifferentiability framework. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 487-506. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 487-506
-
-
Ristenpart, T.1
Shacham, H.2
Shrimpton, T.3
-
37
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM Press November
-
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: ACM CCS 2001, pp. 196-205. ACM Press (November 2001)
-
(2001)
ACM CCS 2001
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
38
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE Computer Society Press May
-
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, pp. 44-55. IEEE Computer Society Press (May 2000)
-
(2000)
2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
39
-
-
70349237760
-
Secure data deduplication
-
ACM
-
Storer, M., Greenan, K., Long, D., Miller, E.: Secure data deduplication. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, pp. 1-10. ACM (2008)
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.1
Greenan, K.2
Long, D.3
Miller, E.4
-
40
-
-
35248849411
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Vadhan, S.P.: On constructing locally computable extractors and cryptosystems in the bounded storage model. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 61-77. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 61-77
-
-
Vadhan, S.P.1
-
41
-
-
84873398049
-
Barriers in cryptography with weak, correlated and leaky sources
-
ACM, New York
-
Wichs, D.: Barriers in cryptography with weak, correlated and leaky sources. In: Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS 2013, pp. 111-126. ACM, New York (2013)
-
(2013)
Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS 2013
, pp. 111-126
-
-
Wichs, D.1
-
44
-
-
84877953172
-
Leakage-resilient client-side deduplication of encrypted data in cloud storage
-
Report 2011/538
-
Xu, J., Chang, E.-C., Zhou, J.: Leakage-resilient client-side deduplication of encrypted data in cloud storage. Cryptology ePrint Archive, Report 2011/538 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology EPrint Archive
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
|