-
1
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput Electr Eng 39 1 2013 47 54
-
(2013)
Comput Electr Eng
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
2
-
-
84866362425
-
A framework for establishing trust in the cloud
-
Imad M. Abbadi, and Muntaha Abbadi A framework for establishing trust in the cloud Comput Electr Eng 38 5 2012 1073 1087
-
(2012)
Comput Electr Eng
, vol.38
, Issue.5
, pp. 1073-1087
-
-
Abbadi, I.M.1
Abbadi, M.2
-
3
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
Krohn MN, Freedman MJ, and Mazieres D. On-the-fly verification of rateless erasure codes for efficient content distribution. In: Proc of SP'04; 2004. p. 226-40.
-
(2004)
Proc of SP'04
, pp. 226-240
-
-
Krohn, M.N.1
Freedman, M.J.2
Mazieres, D.3
-
4
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans Parallel Distrib Syst 22 5 2011 847 859
-
(2011)
IEEE Trans Parallel Distrib Syst
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z et al. Provable data possession at untrusted stores. In: Proc of ACM-CCS '07; 2007. p. 598-609.
-
(2007)
Proc of ACM-CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Et Al., P.Z.6
-
7
-
-
72449185582
-
Proofs of storage from homomorphic identification protocols
-
Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proc of ASIACRYPT '09; 2009. p. 319-33.
-
(2009)
Proc of ASIACRYPT '09
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
9
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, and L. Kissner Remote data checking using provable data possession ACM Trans Inf Syst Secur 14 1 2011 12
-
(2011)
ACM Trans Inf Syst Secur
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
-
10
-
-
80053975961
-
A homomorphic hashing based provable data possession
-
Lanxiang. Chen A homomorphic hashing based provable data possession J Electr Inform Technol 33 9 2011 2199 2204
-
(2011)
J Electr Inform Technol
, vol.33
, Issue.9
, pp. 2199-2204
-
-
Lanxiang, C.1
-
11
-
-
84894098673
-
A hill cipher-based remote data possession checking in cloud storage
-
doi:10.1002/sec.746 doi
-
Chen Lanxiang, Guo Gongde, Peng Zhen. A hill cipher-based remote data possession checking in cloud storage. Secur Commun Networks. doi: http://dx.doi.org/10.1002/sec.746.
-
Secur Commun Networks
-
-
Lanxiang, C.1
Gongde, G.2
Zhen, P.3
-
14
-
-
46649083439
-
Efficient remote data possession checking in critical information infrastructures
-
F. Sebe, J.F. Domingo, A.B. Martinez, Y. Deswarte, and J. Quisquater Efficient remote data possession checking in critical information infrastructures IEEE Trans Knowl Data Eng 20 8 2008 1034 1038
-
(2008)
IEEE Trans Knowl Data Eng
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo, J.F.2
Martinez, A.B.3
Deswarte, Y.4
Quisquater, J.5
-
15
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
Z. Hao, S. Zhong, and N. Yu A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability IEEE Trans Knowl Data Eng 23 9 2011 1432 1437
-
(2011)
IEEE Trans Knowl Data Eng
, vol.23
, Issue.9
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
16
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Juels A, Kaliski BS. Pors: proofs of retrievability for large files. In: Proc of ACM-CCS '07; 2007. p. 584-97.
-
(2007)
Proc of ACM-CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
18
-
-
23044435711
-
Short signatures from the Weil pairing
-
D. Boneh, B. Lynn, and H. Shacham Short signatures from the Weil pairing J Cryptology 17 4 2004 297 319
-
(2004)
J Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
19
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proc of TCC '09; 2009. p. 109-27.
-
(2009)
Proc of TCC '09
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
20
-
-
79960836433
-
Zero-knowledge proofs of retrievability
-
Yan Zhu, Huaixi Wang, Hu Zexing, Gail-Joon Ahn, and Hongxin Hu Zero-knowledge proofs of retrievability Sci China: Inform Sci (Series F) 54 8 2011 1608 1617
-
(2011)
Sci China: Inform Sci (Series F)
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Zexing, H.3
Ahn, G.-J.4
Hu, H.5
-
21
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
Schwarz TJE, Miller EL. Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proc of ICDCS '06; 2006. p. 12.
-
(2006)
Proc of ICDCS '06
, pp. 12
-
-
Tje, S.1
Miller, E.L.2
-
22
-
-
84885645897
-
Using algebraic signatures to check data possession in cloud storage
-
Lanxiang Chen Using algebraic signatures to check data possession in cloud storage Future Gene Comput Syst 29 7 2013 1709 1715
-
(2013)
Future Gene Comput Syst
, vol.29
, Issue.7
, pp. 1709-1715
-
-
Chen, L.1
-
23
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
Bowers KD, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. In: Proc of ACM-CCS '09; 2009. p. 187-98.
-
(2009)
Proc of ACM-CCS '09
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
24
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proc of INFOCOM; 2010. p. 525-33.
-
(2010)
Proc of INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
25
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou Privacy-preserving public auditing for secure cloud storage IEEE Trans Comput 62 2 2013 362 375
-
(2013)
IEEE Trans Comput
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
27
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Pedersen TP. Non-interactive and information-theoretic secure verifiable secret sharing. In: Proc of CRYPTO '91; 1991. p. 129-40.
-
(1991)
Proc of CRYPTO '91
, pp. 129-140
-
-
Pedersen, T.P.1
-
28
-
-
0346528350
-
Cryptographically strong undeniable signatures, unconditionally secure for the signer
-
Chaum D, Heijst E, Pfitzmann B. Cryptographically strong undeniable signatures, unconditionally secure for the signer. In: Proc of CRYPTO '91; 1991. p. 470-84.
-
(1991)
Proc of CRYPTO '91
, pp. 470-484
-
-
Chaum, D.1
Heijst, E.2
Pfitzmann, B.3
-
29
-
-
84920380941
-
Protocols for public key cryptosystems
-
Merkle RC. Protocols for public key cryptosystems. In: Proc of SP'80; 1980. p. 122-33.
-
(1980)
Proc of SP'80
, pp. 122-133
-
-
Merkle, R.C.1
-
30
-
-
84885578699
-
-
National Institute of Standards and Technology. Digital signature standard (DSS); Federal information processing standards publication 186-2, US dept of commerce/NIST; 2000
-
National Institute of Standards and Technology. Digital signature standard (DSS); Federal information processing standards publication 186-2, US dept of commerce/NIST; 2000.
-
-
-
|