-
1
-
-
84866363554
-
Geoproof: proofs of geographic location for cloud computing environment
-
IEEE, Macau, China
-
Albeshri, A. A., Boyd, C., Nieto, J. M. G.: Geoproof: proofs of geographic location for cloud computing environment. In: 3rd International Workshop on Security and Privacy in Cloud Computing Part of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012), pp. 506-514. IEEE, Macau, China (2012).
-
(2012)
3rd International Workshop on Security and Privacy in Cloud Computing Part of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012)
, pp. 506-514
-
-
Albeshri, A.A.1
Boyd, C.2
Nieto, J.M.G.3
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM, New York, NY
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pp. 598-609. ACM, New York, NY (2007).
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
80955142131
-
Do you know where your cloud files are?
-
CCSW '11, ACM, New York, NY
-
Benson, K., Dowsley, R., Shacham, H.: Do you know where your cloud files are? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11, pp. 73-82. ACM, New York, NY (2011).
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop
, pp. 73-82
-
-
Benson, K.1
Dowsley, R.2
Shacham, H.3
-
4
-
-
74049093526
-
Controlling data in the cloud: outsourcing computation without outsourcing control
-
ACM
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85-90. ACM (2009).
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
5
-
-
74049121230
-
Dynamic provable data possession
-
CCS '09, ACM, New York, NY
-
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pp. 213-222. ACM, New York, NY (2009).
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
6
-
-
74049103479
-
PORs: proofs of retrievability for large files
-
CCS '07, ACM, New York, NY
-
Juels, A., Kaliski, B. S. Jr.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pp. 584-597. ACM, New York, NY (2007).
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
7
-
-
77956137294
-
Cryptographic cloud storage
-
In: Sion, R., et al. (eds.), Springer, Berlin
-
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., et al. (eds.) Financial Cryptography and Data Security, vol. 6054 of Lecture Notes in Computer Science, pp. 136-149. Springer, Berlin (2010).
-
(2010)
Financial Cryptography and Data Security, vol. 6054 of Lecture Notes in Computer Science
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
8
-
-
34547469869
-
Towards IP geolocation using delay and topology measurements
-
IMC '06, ACM, New York, NY
-
Katz-Bassett, E., John, J. P., Krishnamurthy, A., Wetherall, D., Anderson, T., Chawathe, Y.: Towards IP geolocation using delay and topology measurements. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06, pp. 71-84. ACM, New York, NY (2006).
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 71-84
-
-
Katz-Bassett, E.1
John, J.P.2
Krishnamurthy, A.3
Wetherall, D.4
Anderson, T.5
Chawathe, Y.6
-
10
-
-
58349118819
-
Compact proofs of retrievability
-
ASIACRYPT '08, Springer, Berlin
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '08, pp. 90-107. Springer, Berlin (2008).
-
(2008)
Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
11
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
ESORICS'09, Springer, Berlin
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, ESORICS'09, pp. 355-370. Springer, Berlin (2009).
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
|