-
2
-
-
84904408332
-
-
"Sugarsync," https://www.sugarsync.com/business/.
-
-
-
-
5
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
Alexandria, Virginia, USA: ACM
-
A. Juels and B. S. Kaliski, Jr., "Pors: Proofs of retrievability for large files," in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07. Alexandria, Virginia, USA: ACM, 2007, pp. 584-597.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Ser. CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
6
-
-
74049102823
-
Provable data possession at untrusted stores
-
Alexandria, Virginia, USA: ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07. Alexandria, Virginia, USA: ACM, 2007, pp. 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Ser. CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
7
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Australia: Springer-Verlag
-
H. Shacham and B. Waters, "Compact proofs of retrievability," in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ser. ASIACRYPT '08. Melbourne, Australia: Springer-Verlag, 2008, pp. 90-107.
-
(2008)
Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Ser. ASIACRYPT '08
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
8
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
Chicago, Illinois, USA: ACM
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of retrievability: theory and implementation," in Proceedings of the 2009 ACM workshop on Cloud computing security, ser. CCSW '09. Chicago, Illinois, USA: ACM, 2009, pp. 43-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Ser. CCSW '09
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
9
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Saint-Malo, France
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in Proceedings of the 14th European conference on Research in computer security, ser. ESORICS'09, Saint-Malo, France, 2009, pp. 355-370.
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security, Ser. ESORICS'09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
10
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego, California, USA
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in Proceedings of the 29th IEEE International Conference on Computer Communications, ser. INFOCOM'10, San Diego, California, USA, 2010, pp. 525-533.
-
(2010)
Proceedings of the 29th IEEE International Conference on Computer Communications, Ser. INFOCOM'10
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
11
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
Hangzhou, China: ACM
-
J. Yuan and S. Yu, "Proofs of retrievability with public verifiability and constant communication cost in cloud," in Proceedings of the 2013 International Workshop on Security in Cloud Computing, ser. Cloud Computing '13. Hangzhou, China: ACM, 2013, pp. 19-26.
-
(2013)
Proceedings of the 2013 International Workshop on Security in Cloud Computing, Ser. Cloud Computing '13
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
12
-
-
84893549172
-
Secure and constant cost public cloud storage auditing with deduplication
-
Washington, USA
-
J. Yuan and S. Y u, "Secure and constant cost public cloud storage auditing with deduplication," in Proceedings of the 1st IEEE Conference on Communications and Network Security, ser. CNS'13, Washington, USA, 2013, pp. 145-153.
-
(2013)
Proceedings of the 1st IEEE Conference on Communications and Network Security, Ser. CNS'13
, pp. 145-153
-
-
Yuan, J.1
-
13
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
Turin, Italy
-
B. Wang, L. Baochun, and L. Hui, "Public auditing for shared data with efficient user revocation in the cloud," in Proceedings of the 32nd IEEE International Conference on Computer Communications, ser. INFOCOM '13, Turin, Italy, 2013, pp. 2904-2912.
-
(2013)
Proceedings of the 32nd IEEE International Conference on Computer Communications, Ser. INFOCOM '13
, pp. 2904-2912
-
-
Wang, B.1
Baochun, L.2
Hui, L.3
-
14
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
Washington, DC, USA: IEEE Computer Society
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, ser. CLOUD '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 295-302.
-
(2012)
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, Ser. CLOUD '12
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
16
-
-
0017018484
-
New directions in cryptography
-
Sep.
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644-654, Sep. 1976.
-
(1976)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
17
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
London, UK, UK: Springer-Verlag
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, ser. CRYPTO '01. London, UK, UK: Springer-Verlag, 2001, pp. 213-229.
-
(2001)
Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Ser. CRYPTO '01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
18
-
-
35048848152
-
Short signatures without random oracles
-
Interlaken, Switzerland
-
D. Boneh and X. Boyen, "Short signatures without random oracles," in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, ser. EUROCRYPT'04, Interlaken, Switzerland, 2004, pp. 56-73.
-
(2004)
Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Ser. EUROCRYPT'04
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
19
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
Singapore
-
A. Kate, G. M. Zaverucha, and I. Goldberg, "Constant-size commitments to polynomials and their applications," in In Proceedings of the 16th Annual International Conference on the Theory and Application of Cryptology and Information Security, ser. ASIACRYPT'10, Singapore, 2010, pp. 177-194.
-
(2010)
Proceedings of the 16th Annual International Conference on the Theory and Application of Cryptology and Information Security, Ser. ASIACRYPT'10
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
21
-
-
84904408333
-
-
"jpbc," http://gas.dia.unisa.it/projects/jpbc/.
-
-
-
-
22
-
-
84904434478
-
-
"Apache," http://www.openoffice.org/.
-
Apache
-
-
|