-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
70249129465
-
Scalable and efficient provable data possession
-
G. Ateniese, R. Dipietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (Secure-Comm '08), 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (Secure-Comm '08)
-
-
Ateniese, G.1
Dipietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
3
-
-
74049121230
-
Dynamic provable data possession
-
C.C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 213-222, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 213-222
-
-
Erway, C.C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
4
-
-
46649083439
-
Efficient remote data integrity checking in critical information infrastructures
-
Aug.
-
F. Sebe, J. Domingo-Ferrer, A. Martinez-balleste, Y. Deswarte, and J. Quisquater, "Efficient Remote Data Integrity Checking in Critical Information Infrastructures," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Martinez-Balleste, A.3
Deswarte, Y.4
Quisquater, J.5
-
5
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10), pp. 756-758, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10)
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
6
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
Dec.
-
Y. Zhu, H. Hu, G.J. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yu, M.4
-
7
-
-
51849117195
-
MR-PPDP: Multiple-replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PPDP: Multiple-Replica Provable Data Possession," Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), pp. 411-420, 2008.
-
(2008)
Proc. IEEE 28th Int'l Conf. Distributed Computing Systems (ICDCS '08)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
8
-
-
84863642638
-
Provable possession and replication of data over cloud servers
-
CACR, Univ. of Waterloo
-
A.F. Barsoum and M.A. Hasan, "Provable Possession and Replication of Data over Cloud Servers," Technical Report 2010/32,2010, CACR, Univ. of Waterloo, http://www.cacr.math. uwaterloo.ca/techreports/2010/cacr2010-32.pdf, 2013.
-
(2013)
Technical Report 2010/32,2010
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
9
-
-
78650364292
-
A multiple-replica remote data possession checking protocol with public verifiability
-
Z. Hao and N. Yu, "A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability," Proc. Second Int'l Symp. Data, Privacy, and E-Commerce (ISDPE '10), pp. 84-89, 2010.
-
(2010)
Proc. Second Int'l Symp. Data, Privacy, and E-Commerce (ISDPE '10)
, pp. 84-89
-
-
Hao, Z.1
Yu, N.2
-
11
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 525-533, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
13
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
16
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
K.D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Proc. ACM Cloud Computing Security Workshop (CCSW '09), pp. 43-54, 2009.
-
(2009)
Proc. ACM Cloud Computing Security Workshop (CCSW '09)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
18
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Y. Dodis, S. Vadhan, and D. Wichs1, "Proofs of Retrievability via Hardness Amplification," Proc. Sixth Theory of Cryptography Conf. (TCC '09), pp. 109-127, 2009.
-
(2009)
Proc. Sixth Theory of Cryptography Conf. (TCC '09)
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichsl, D.3
-
19
-
-
79960836433
-
Zero-knowledge proofs of retrievability
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, and H. Hu, "Zero-Knowledge Proofs of Retrievability," Science China Information Science, vol. 54, no. 8, pp. 1608-1617, 2011.
-
(2011)
Science China Information Science
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
-
20
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signatures for Delegating Signing Operation," Proc. Third ACM Conf. Computer and Comm. Security (CCS '96), pp. 48-57, 1996.
-
(1996)
Proc. Third ACM Conf. Computer and Comm. Security (CCS '96)
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
21
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the rsa cryptosystem
-
Nov./Dec.
-
M. Hwang, J. Lu, and E. Lin, "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1552-1560, Nov./Dec. 2003.
-
(2003)
IEEE Trans. Knowledge and Data Eng.
, vol.15
, Issue.6
, pp. 1552-1560
-
-
Hwang, M.1
Lu, J.2
Lin, E.3
-
22
-
-
79951935674
-
Unidirectional chosen-ciphertext secure proxy re-encryption
-
Mar.
-
B. Libert and D. Vergnaud, "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption," IEEE Trans. Information Theory, vol. 57, no. 3, pp. 1786-1802, Mar. 2011.
-
(2011)
IEEE Trans. Information Theory
, vol.57
, Issue.3
, pp. 1786-1802
-
-
Libert, B.1
Vergnaud, D.2
-
23
-
-
53149090186
-
Proxy-based wireless data access algorithms in mobile hotspots
-
Sept.
-
S. Pack, H. Rutagemwa, X. Shen, J. Mark, and K. Park, "Proxy-Based Wireless Data Access Algorithms in Mobile Hotspots," IEEE Trans. Vehicular Technology, vol. 57, no. 5, pp. 3165-3177, Sept. 2008.
-
(2008)
IEEE Trans. Vehicular Technology
, vol.57
, Issue.5
, pp. 3165-3177
-
-
Pack, S.1
Rutagemwa, H.2
Shen, X.3
Mark, J.4
Park, K.5
-
24
-
-
84874324906
-
Identity-Based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. (CRYPTO '01), pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture notes in computer science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
25
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New Explicit Conditions of Elliptic Curve Traces for FR-Reduction," IEICE Trans. Fundamentals, vol. 5, pp. 1234-1243, 2001. (Pubitemid 32486851)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
26
-
-
84946840347
-
Short signatures from the weil pairing
-
Advances in Cryptology - ASIACRYPT 2001
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT '01), pp. 514-532, 2001. (Pubitemid 33371204)
-
(2002)
Lecture notes in computer science
, Issue.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
29
-
-
0005340397
-
Responses to NISTs proposal
-
S. Vanstone, "Responses to NISTs Proposal," Comm. ACM, vol. 35, pp. 50-52, 1992.
-
(1992)
Comm. ACM
, vol.35
, pp. 50-52
-
-
Vanstone, S.1
|