-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
October
-
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proc. of ACM CCS, Virginia, USA, pp. 598-609 (October 2007)
-
(2007)
Proc. of ACM CCS, Virginia, USA
, pp. 598-609
-
-
Ateniese, G.1
-
2
-
-
84455190541
-
Scalable and efficient provable data possession
-
September
-
Ateniese, G., et al.: Scalable and efficient provable data possession. In: Proc. of SecureComm, VA, USA, pp. 1-10 (September 2008)
-
(2008)
Proc. of SecureComm, VA, USA
, pp. 1-10
-
-
Ateniese, G.1
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing effficient protocols
-
November
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing effficient protocols. In: Proc. of ACM CCS, VA, USA, pp. 62-73 (November 1993)
-
(1993)
Proc. of ACM CCS, VA, USA
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
39049142710
-
Secure localization with hidden and mobile base stations
-
April
-
Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the IEEE International Conference on Computer Communications, Catalunya, Spain, pp. 1-10 (April 2006)
-
(2006)
Proceedings of the IEEE International Conference on Computer Communications, Catalunya, Spain
, pp. 1-10
-
-
Capkun, S.1
Cagalj, M.2
Srivastava, M.3
-
6
-
-
84870282993
-
Efficient fair conditional payments for outsourcing computations
-
Chen, X., Li, J., Susilo, W.: Efficient fair conditional payments for outsourcing computations. IEEE Transactions on Information Forensics and Security 7(6), 1687-1694 (2012)
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1687-1694
-
-
Chen, X.1
Li, J.2
Susilo, W.3
-
7
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
8
-
-
84859040590
-
Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
directive 95/46/EC
-
Commission, E.: Regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. general data protection regulation, directive 95/46/EC (2012)
-
(2012)
General Data Protection Regulation
-
-
Commission, E.1
-
9
-
-
84921068281
-
On the exact security of full domain hash
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 229-235
-
-
Coron, J.-S.1
-
10
-
-
46649090585
-
Remote integrity checking
-
November
-
Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland, pp. 1-11 (November 2003)
-
(2003)
Proc. of Conference on Integrity and Internal Control in Information Systems (IICIS 2003), Lausanne, Switzerland
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.J.2
Saidane, A.3
-
11
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
13
-
-
74049121230
-
Dynamic provable data possession
-
Illinois, USA November
-
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proc. of ACM CCS. pp. 213-222. Illinois, USA (November 2009)
-
(2009)
Proc. of ACM CCS
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
14
-
-
47849089563
-
Demonstrating data possession and uncheatable data transfer
-
Filho, D.L.G., Baretto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive 2006 (2006), http://eprint.iacr. org/2006/150
-
(2006)
IACR EPrint Archive 2006
-
-
Filho, D.L.G.1
Baretto, P.S.L.M.2
-
15
-
-
80755168326
-
Proof of ownership in remote storage system
-
October
-
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proof of ownership in remote storage system. In: Proc. of ACM CCS, Illinois, USA, pp. 491-500 (October 2011)
-
(2011)
Proc. of ACM CCS, Illinois, USA
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
16
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
November
-
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: Deduplication in cloud storage. In: Proc. of IEEE Security & Privicy, CA, USA, pp. 40-47 (November 2010)
-
(2010)
Proc. of IEEE Security & Privicy, CA, USA
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
18
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Juels, A., Kaliski, B.S.: Pors: Proofs of retrievability for large files. In: Proc. of ACM CCS, Virginia, USA, pp. 584-597 (2007)
-
(2007)
Proc. of ACM CCS, Virginia, USA
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
20
-
-
84969346266
-
A certified digital signature
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
21
-
-
84901654486
-
Provable data possession at untrusted stores
-
June
-
Papagiannaki, K., et al.: Provable data possession at untrusted stores. In: Proc. IEEE INFOCOM 2002, NY, USA, pp. 535-544 (June 2002)
-
(2002)
Proc. IEEE INFOCOM 2002, NY, USA
, pp. 535-544
-
-
Papagiannaki, K.1
-
22
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
July
-
Schwarz, T.S.J., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS 2006, Lisboa, Portugal, pp. 1-12 (July 2006)
-
(2006)
Proceedings of ICDCS 2006, Lisboa, Portugal
, pp. 1-12
-
-
Schwarz, T.S.J.1
Miller, E.L.2
-
23
-
-
46649100533
-
-
Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain July
-
Sebe, F., et al.: Time-bounded remote file integrity checking. Tech. Rep. 04429, Universitat Rovira i Virgili, Tarragona, Spain (July 2004)
-
(2004)
Time-bounded Remote File Integrity Checking
-
-
Sebe, F.1
-
24
-
-
58349118819
-
Compact proofs of retrievability
-
December
-
Shacham, H.,Waters, B.: Compact proofs of retrievability. In: Proc. of ASIACRYPT, Melbourne, Australia, pp. 90-107 (December 2008)
-
(2008)
Proc. of ASIACRYPT, Melbourne, Australia
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
26
-
-
85094324868
-
Octant: A comprehensive framework for the geolocalization of internet hosts
-
April
-
Wong, B., Stoyanov, I., Sirer, E.G.: Octant: A comprehensive framework for the geolocalization of internet hosts. In: Proceedings of the USENIX Networked Systems Design and Implementation, MA, USA, pp. 313-326 (April 2007)
-
(2007)
Proceedings of the USENIX Networked Systems Design and Implementation, MA, USA
, pp. 313-326
-
-
Wong, B.1
Stoyanov, I.2
Sirer, E.G.3
-
27
-
-
77952381914
-
An efficiently-verifiable zero-knowledge argument for proofs of knowledge
-
July
-
Yamamoto, G., Fujisaki, E., Abe, M.: An efficiently-verifiable zero-knowledge argument for proofs of knowledge. IEICE Technical Report ISEC2005-48 105, 41-45 (July 2005)
-
(2005)
IEICE Technical Report ISEC2005-48
, vol.105
, pp. 41-45
-
-
Yamamoto, G.1
Fujisaki, E.2
Abe, M.3
-
28
-
-
63449088479
-
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings
-
Information Security and Privacy
-
Zhang, F., Kim, K.: Efficient id-based blind signature and proxy signature from bilinear pairings. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 312-323. Springer, Heidelberg (2003) (Pubitemid 36892644)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2727
, pp. 312-323
-
-
Zhang, F.1
Kim, K.2
|