-
2
-
-
78650053109
-
Side channels in cloud services, the case of deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services, the case of deduplication in cloud storage," IEEE Security and Privacy Magazine, vol. special issue of Cloud Security, pp. 40-47, 2010.
-
(2010)
IEEE Security and Privacy Magazine, Vol. Special of Cloud Security
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
3
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Chicago, IL, USA: ACM, OCT
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in ACM conference on Computer and communications security. Chicago, IL, USA: ACM, OCT 2011, pp. 491-500.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
4
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
San Francisco, CA, USA: USENIX Association Berkeley, AUG
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, "Dark clouds on the horizon: Using cloud storage as attack vector and online slack space," in 20th USENIX conference on Security. San Francisco, CA, USA: USENIX Association Berkeley, AUG 2011, pp. 5-5.
-
(2011)
20th USENIX Conference on Security
, pp. 5-5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
5
-
-
74049103479
-
Proofs of retrievability for large files
-
Alexandria, VA, USA: ACM, OCT
-
A. Juels and J. P. B. S. Kaliski, "proofs of retrievability for large files," in ACM conference on Computer and communications security. Alexandria, VA, USA: ACM, OCT 2007, p. 584597.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski, J.P.B.S.2
-
6
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Australia: Springer-Verlag, DEC
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security. Melbourne, Australia: Springer-Verlag, DEC 2008, pp. 90-107.
-
(2008)
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
7
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, VA, USA: ACM, OCT
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in ACM conference on Computer and communications security. Alexandria, VA, USA: ACM, OCT 2007, p. 598609.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
8
-
-
79959823910
-
Remote data checking using provable data possession
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, "Remote data checking using provable data possession," ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 12:1-12:34, 2011.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 121-1234
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
9
-
-
0031640285
-
Spot-checkers
-
Dallas, Texas, United States: ACM, MAY
-
F. Ergün, S. Kannan, S. R. Kumar, R. Rubinfeld, and M. Viswanathan, "Spot-checkers," in Proceedings of the thirtieth annual ACM symposium on Theory of computing. Dallas, Texas, United States: ACM, MAY 1998, pp. 259-268.
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 259-268
-
-
Ergün, F.1
Kannan, S.2
Kumar, S.R.3
Rubinfeld, R.4
Viswanathan, M.5
-
11
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
Chicago, IL, USA: ACM, Nov.
-
K. Bowers, A. Juels, and A. Opera, "Hail: a high-availability and integrity layer for cloud storage," in ACM conference on Computer and communications security. Chicago, IL, USA: ACM, Nov. 2009, p. 187198.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.1
Juels, A.2
Opera, A.3
-
12
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
New York, NY, USA: ACM, NOV
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: Theory and implementation," in Proceedings of the 2009 ACM workshop on Cloud computing security. New York, NY, USA: ACM, NOV 2009, pp. 43-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
13
-
-
51849117195
-
Mr-pdp: Multiplereplica provable data possession
-
Beijing, China: IEEE, JUN
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "Mr-pdp: Multiplereplica provable data possession," in International Conference on Distributed Computing Systems (ICDCS). Beijing, China: IEEE, JUN 2008, pp. 411-420.
-
(2008)
International Conference on Distributed Computing Systems (ICDCS)
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
14
-
-
67650314202
-
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
-
R. Elbaz, D. Champagne, C. Gebotys, R. B. Lee, N. Potlapally, and L. Torres, "Hardware mechanisms for memory authentication: A survey of existing techniques and engines," Transactions on Computational Science, vol. IV, pp. 1-22, 2009.
-
(2009)
Transactions on Computational Science
, vol.4
, pp. 1-22
-
-
Elbaz, R.1
Champagne, D.2
Gebotys, C.3
Lee, R.B.4
Potlapally, N.5
Torres, L.6
|