-
1
-
-
84894035639
-
-
Remote integrity checking. In: Proc. of IICIS '03
-
Deswarte Y, Quisquater J J. Remote integrity checking. In: Proc. of IICIS '03, 2003, pp.1-11.
-
(2003)
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.J.2
-
2
-
-
84894033008
-
-
Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, Report 2006/150,
-
Filho D L G, Baretto P S L M. Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, 2006. Report 2006/150, http://eprint.iacr.org/2006/150.
-
(2006)
-
-
Filho, D.L.G.1
Baretto, P.S.L.M.2
-
3
-
-
74049102823
-
-
Provable data possession at untrusted stores. In: Proc. of ACM-CCS '07
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proc. of ACM-CCS '07, 2007, pp.598-609.
-
(2007)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
4
-
-
72449185582
-
-
Proofs of storage from homomorphic identification protocols. In: Proc. of ASIACRYPT '09
-
Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. In: Proc. of ASIACRYPT '09, 2009, pp. 319-333.
-
(2009)
, pp. 319-333
-
-
Ateniese, G.1
Kamara, S.2
Katz, J.3
-
5
-
-
70249129465
-
-
Scalable and efficient provable data possession. In: Proc. of SecureComm '08
-
Ateniese G, Pietro R D, Mancini L V, Tsudik G. Scalable and efficient provable data possession. In: Proc. of SecureComm '08, 2008, pp.1-10.
-
(2008)
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
6
-
-
70749134001
-
A practical data possession checking scheme for networked archival storage
-
Xiao D, Shu J, Chen K, Zheng W. A practical data possession checking scheme for networked archival storage. Journal of Computer Research and Development 2009; 46(10):1660-1668.
-
(2009)
Journal of Computer Research and Development
, vol.46
, Issue.10
, pp. 1660-1668
-
-
Xiao, D.1
Shu, J.2
Chen, K.3
Zheng, W.4
-
7
-
-
51849117195
-
-
MR-PDP: multiple-replica provable data possession. In: Proc. of ICDCS '08
-
Curtmola R, Khan O, Burns R, Ateniese G. MR-PDP: multiple-replica provable data possession. In: Proc. of ICDCS '08, 2008, pp.411-420.
-
(2008)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
8
-
-
74049121230
-
-
Dynamic provable data possession. In: Proc. of ACM-CCS '09
-
Erway C, A Küpçü, Papamanthou C, Tamassia R. Dynamic provable data possession. In: Proc. of ACM-CCS '09, 2009, pp.213-222.
-
(2009)
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
9
-
-
46649083439
-
-
Efficient remote data possession checking in critical information infrastructures. IEEE Trans. on Knowl. and Data Eng.
-
Sebe F, Domingo J F, Martinez A B, Deswarte Y, Quisquater J. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. on Knowl. and Data Eng., 2007, pp.1034-1038.
-
(2007)
, pp. 1034-1038
-
-
Sebe, F.1
Domingo, J.F.2
Martinez, A.B.3
Deswarte, Y.4
Quisquater, J.5
-
10
-
-
74049103479
-
-
PORs: proofs of retrievability for large files. In: Proc. of ACM-CCS '07
-
Juels A, Kaliski B S. PORs: proofs of retrievability for large files. In: Proc. of ACM-CCS '07, 2007, pp.584-597.
-
(2007)
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
11
-
-
58349118819
-
-
Compact proofs of retrievability. In: Proc. of ASIACRYPT '08,.
-
Shacham H, Waters B. Compact proofs of retrievability. In: Proc. of ASIACRYPT '08, 2008, pp.90-107.
-
(2008)
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
12
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. J. Cryptology 2004; 17(4):297-319.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
70350681128
-
-
Proofs of retrievability via hardness amplification. In: Proc. of TCC '09
-
Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: Proc. of TCC '09, 2009, pp.109-127.
-
(2009)
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
14
-
-
33947694320
-
-
Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS '06,.
-
Schwarz T J E, Miller E L. Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS '06, 2006, pp.12.
-
(2006)
, pp. 12
-
-
Schwarz, T.J.E.1
Miller, E.L.2
-
15
-
-
70349245590
-
-
Robust remote data checking. In: Proc. of StorageSS '08
-
Curtmola R, Khan O, Burns R. Robust remote data checking. In: Proc. of StorageSS '08, 2008, pp.63-68.
-
(2008)
, pp. 63-68
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
16
-
-
74049136395
-
-
Proofs of retrievability: theory and implementation. In: Proc. of ACM-CCSW '09
-
Bowers K D, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: Proc. of ACM-CCSW '09, 2009, pp.43-54.
-
(2009)
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
17
-
-
74049144464
-
-
HAIL: a high-availability and integrity layer for cloud storage. In: Proc. of ACM-CCS '09
-
Bowers K D, Juels A, Oprea A. HAIL: a high-availability and integrity layer for cloud storage. In: Proc. of ACM-CCS '09, 2009, pp.187-198.
-
(2009)
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
18
-
-
70449569012
-
-
Ensuring data storage security in cloud computing. In: Proc. of IWQoS '09
-
Wang C, Wang Q, Ren K, Lou W. Ensuring data storage security in cloud computing. In: Proc. of IWQoS '09, 2009, pp.1-9.
-
(2009)
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
19
-
-
70350389843
-
-
Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. of ESORICS '09
-
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proc. of ESORICS '09, 2009, pp.355-370.
-
(2009)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
20
-
-
77953295132
-
-
Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM, San Diego, CA.
-
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM 2010, San Diego, CA.
-
(2010)
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
21
-
-
35048891868
-
-
Keying hash functions for message authentication. Advances in Cryptology-CRYPTO '96.
-
Mihir Bellare, Ran Canettiy, Hugo Krawczykz. Keying hash functions for message authentication. Advances in Cryptology-CRYPTO '96, pp. 1-15.
-
-
-
Bellare, M.1
Canettiy, R.2
Krawczykz, H.3
-
22
-
-
4544340070
-
Cryptography in an algebraic alphabet
-
Hill LS. Cryptography in an algebraic alphabet. The American Mathematical Monthly 1929; 36:306-312.
-
(1929)
The American Mathematical Monthly
, vol.36
, pp. 306-312
-
-
Hill, L.S.1
-
23
-
-
4544337564
-
Concerning certain linear transformation apparatus of cryptography
-
Hill LS. Concerning certain linear transformation apparatus of cryptography. The American Mathematical Monthly 1931; 38:135-154.
-
(1931)
The American Mathematical Monthly
, vol.38
, pp. 135-154
-
-
Hill, L.S.1
-
27
-
-
70449510403
-
-
A secure variant of the Hill cipher, Proceedings-IEEE Symposium on Computers and Communications-
-
Mohsen Toorani, Abolfazl Falahati, A secure variant of the Hill cipher, Proceedings-IEEE Symposium on Computers and Communications, pp.313-316, 2009.
-
(2009)
, pp. 313-316
-
-
Toorani, M.1
Falahati, A.2
-
29
-
-
85014948963
-
How to make the Hill cipher secure
-
Saeednia S. How to make the Hill cipher secure. Cryptologia Journal 2000; 24(4):353-360.
-
(2000)
Cryptologia Journal
, vol.24
, Issue.4
, pp. 353-360
-
-
Saeednia, S.1
|