-
1
-
-
84888414106
-
Net app deduplication for fas and v-series deployment and implementation guide
-
C. Alvarez, "Net app deduplication for fas and v-series deployment and implementation guide," Technical ReportTR, 3505, 2011.
-
(2011)
Technical ReportTR
, vol.3505
-
-
Alvarez, C.1
-
3
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Dec.
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer, "Farsite: federated, available, and reliable storage for an incompletely trusted environment," in Proc. of the 5th symposium on Operating systems design and implementation, pp. 1-14, Dec. 2002.
-
(2002)
Proc. of the 5th Symposium on Operating Systems Design and Implementation
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
4
-
-
70349237760
-
Secure data deduplication
-
M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, "Secure data deduplication," in Proc. of the 4th ACM international workshop on Storage security and survivability, 2008.
-
(2008)
Proc. of the 4th ACM International Workshop on Storage Security and Survivability
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
5
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage," IEEE Security and Privacy, vol. 8, no. 6, pp. 40-47, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
6
-
-
84882956183
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, "Dark clouds on the horizon: using cloud storage as attack vector and online slack space," in USENIX Security.
-
USENIX Security
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
7
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. of CCS'11, 2011.
-
(2011)
Proc. of CCS'11
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
8
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
A. Juels, "Pors: proofs of retrievability for large files," in Proc. of CCS'07, 2007.
-
(2007)
Proc. of CCS'07
-
-
Juels, A.1
-
10
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proc. of CCS'07, 2007.
-
(2007)
Proc. of CCS'07
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
11
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
Sept.
-
Z. Hao, S. Zhong, and N. Yu, "A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability," IEEE Transactions on Knowledge and Data Engineering, vol. 23, pp. 1432-1437, Sept. 2011.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.3
-
12
-
-
84945135810
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
Springer, May
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation," in EUROCRYPT'01, pp. 93-118, Springer, May 2001.
-
(2001)
EUROCRYPT'01
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT'98, pp. 127-144, 1998.
-
(1998)
Proc. of EUROCRYPT'98
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
15
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Trans. Inf. Syst. Secur., vol. 9, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
16
-
-
84946840347
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proc. of ASIACRYPT'01, pp. 514-532, 2001.
-
(2001)
Proc. of ASIACRYPT'01
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
17
-
-
84969346266
-
A certified digital signature
-
R. C. Merkle, "A certified digital signature," in Proc. of CRYPTO'89, pp. 218-238, 1990.
-
(1990)
Proc. of CRYPTO'89
, pp. 218-238
-
-
Merkle, R.C.1
|