-
1
-
-
84901477982
-
-
https://github.com/openstack/swift.
-
-
-
-
3
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
New York, NY, USA. ACM
-
R. Di Pietro and A. Sorniotti. Boosting efficiency and security in proof of ownership for deduplication. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 12, pages 81-82, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 12
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
4
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In In Proceedings of 22nd International Conference on Distributed Computing Systems (ICDCS, 2002.
-
(2002)
Proceedings of 22nd International Conference on Distributed Computing Systems (ICDCS)
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
5
-
-
84901474445
-
Understanding data deduplication ratios
-
June
-
M. Dutch. Understanding data deduplication ratios. SNIA White Paper, June 2008.
-
(2008)
SNIA White Paper
-
-
Dutch, M.1
-
8
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
New York, NY, USA. ACM
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg. Proofs of ownership in remote storage systems. In Proceedings of the 18th ACM conference on Computer and communications security, CCS 11, pages 491-500, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 11
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
9
-
-
11244267013
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
D. Hankerson, A. J. Menezes, and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2003.
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
10
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. IEEE Security And Privacy, 8(6):40-47, 2010.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
11
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
London, UK, UK. Springer-Verlag
-
R. C. Merkle. A digital signature based on a conventional encryption function. In A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 87, pages 369-378, London, UK, UK, 1988. Springer-Verlag.
-
(1988)
A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO 87
, pp. 369-378
-
-
Merkle, R.C.1
-
12
-
-
84863584951
-
Private data deduplication protocols in cloud storage
-
ACM, New York, NY, USA
-
W. K. Ng, Y. Wen, and H. Zhu. Private data deduplication protocols in cloud storage. In Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 12, pages 441-446, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC 12
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
-
13
-
-
70349237760
-
Secure data deduplication
-
ACM, New York, NY, USA
-
M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller. Secure data deduplication. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS 08, pages 1-10, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS 08
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
15
-
-
78249288815
-
A novel encryption scheme for data deduplication system
-
C. Wang, Z. guang Qin, J. Peng, and J. Wang. A novel encryption scheme for data deduplication system. In Communications, Circuits and Systems (ICCCAS), 2010 International Conference on, pages 265-269, 2010.
-
(2010)
Communications, Circuits and Systems (ICCCAS), 2010 International Conference on
, pp. 265-269
-
-
Wang, C.1
Qin, Z.G.2
Peng, J.3
Wang, J.4
-
16
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
ACM, New York, NY, USA
-
J. Xu, E.-C. Chang, and J. Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS 13, pages 195-206, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 13
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
|