-
1
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
2
-
-
77955726417
-
Network coding for distributed storage systems
-
A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539-4551, 2010.
-
(2010)
Information Theory, IEEE Transactions on
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.1
Godfrey, P.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
3
-
-
58349118819
-
Compact proofs of retrievability
-
Springer
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in Advances in Cryptology-ASIACRYPT 2008, ser. LNCS, Springer vol. 5350, pp. 90-107, 2008.
-
(2008)
Advances in Cryptology-ASIACRYPT 2008, Ser. LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
4
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in CCS '07. ACM, pp. 598-609. 2007.
-
(2007)
CCS '07. ACM
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
5
-
-
84861630520
-
Lt codes-based secure and reliable cloud storage service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, "Lt codes-based secure and reliable cloud storage service," in IEEE INFOCOM, pp. 693-701, 2012.
-
(2012)
IEEE INFOCOM
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
6
-
-
85184291865
-
Enabling data integrity protection in regenerating-coding-based cloud storage
-
H. C. H. Chen and P. P. C. Lee, "Enabling data integrity protection in regenerating-coding-based cloud storage," IEEE SRDS 2012, 2012.
-
(2012)
IEEE SRDS 2012
-
-
Chen, H.C.H.1
Lee, P.P.C.2
-
7
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
K. D. Bowers, A. Juels, and A. Oprea, "Hail: a high-availability and integrity layer for cloud storage," in ACM CCS '09. pp. 187-198, 2009.
-
(2009)
ACM CCS '09.
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
9
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Springer
-
Y. Dodis, S. Vadhan, and D. Wichs. Proofs of Retrievability via Hardness Amplification. In proceedings of TCC '09, Springer, 109-127, 2009.
-
(2009)
Proceedings of TCC '09
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
10
-
-
79960873240
-
Padding for orthogonality: Efficient subspace authentication for network coding
-
P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for orthogonality: Efficient subspace authentication for network coding," in INFOCOM, 2011 Proceedings IEEE, pp. 1026-1034, 2011.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 1026-1034
-
-
Zhang, P.1
Jiang, Y.2
Lin, C.3
Yao, H.4
Wasef, A.5
Shen, X.6
-
11
-
-
85027184925
-
Coding constructions for blacklisting problems without computational assumptions
-
R. Kumar, S. Rajagopalan, and A. Saha, "Coding constructions for blacklisting problems without computational assumptions," in Advances in Cryptology CRYPTO 99, ser. LNCS, pp. 783-783, 1999.
-
(1999)
Advances in Cryptology CRYPTO 99, Ser. LNCS
, pp. 783-783
-
-
Kumar, R.1
Rajagopalan, S.2
Saha, A.3
-
12
-
-
68849097857
-
Homomorphic macs: Mac-based integrity for network coding
-
S. Agrawal and D. Boneh, "Homomorphic macs: Mac-based integrity for network coding," in Applied Cryptography and Network Security, LNCS vol. 5536, pp. 292-305, 2009.
-
(2009)
Applied Cryptography and Network Security, LNCS
, vol.5536
, pp. 292-305
-
-
Agrawal, S.1
Boneh, D.2
|