-
1
-
-
77954695824
-
-
(accessed April 1, 2013)
-
Cloud Security Alliance. (2010) Top threats to cloud computing. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf. (accessed April 1, 2013).
-
(2010)
Top Threats to Cloud Computing
-
-
-
3
-
-
84902475228
-
Remote integrity checking
-
Jajodia, S. and Strous, L. (eds), Lausanne, Switzerland, November 13-14, Springer, Berlin
-
Deswarte, Y., Quisquater, J.J. and Saidane, A. (2003) Remote integrity checking. In Jajodia, S. and Strous, L. (eds), Proc. IICIS 2004, Lausanne, Switzerland, November 13-14, Vol. 140, pp. 1-11. Springer, Berlin.
-
(2003)
Proc. IICIS 2004
, vol.140
, pp. 1-11
-
-
Deswarte, Y.1
Quisquater, J.J.2
Saidane, A.3
-
5
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Backes, M. and Ning, P. (eds), Saint-Malo, France, September 21-23, Lecture Notes in Computer Science 5789, Springer, Berlin
-
Wang, Q., Wang, C., Li, J., Ren, K. and Lou, W. (2009) Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In Backes, M. and Ning, P. (eds), Proc. ESORICS2009, Saint-Malo, France, September 21-23, Lecture Notes in Computer Science 5789, pp. 355-370. Springer, Berlin.
-
(2009)
Proc. ESORICS2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
6
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Mandyam, G., Westphal, C., Chuah, M.C., Cohen, R. and Xue, G. (eds), San Diego, CA, March 14-19, 2010, IEEE Computer Society
-
Wang, C., Wang, Q., Ren, K. and Lou, W. (2010) Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In Mandyam, G., Westphal, C., Chuah, M.C., Cohen, R. and Xue, G. (eds), Proc. IEEE INFOCOM 2010, San Diego, CA, March 14-19, 2010, pp. 525-533, IEEE Computer Society.
-
(2010)
Proc. IEEE INFOCOM 2010
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
7
-
-
79953294892
-
Enabling public audibility and data dynamics for storage security in cloud computing
-
Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J. (2011) Enabling public audibility and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst., 22, 847-859.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
8
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (eds), Melbourne, Australia, Lecture Notes in Computer Science, Springer, Berlin
-
Shacham, H. and Waters, B. (2008) Compact Proofs of Retrievability. In Pieprzyk, J. (eds), Proc. ASIACRYPT 2008, Melbourne, Australia, Lecture Notes in Computer Science, Vol. 5350, pp. 90-107. Springer, Berlin.
-
(2008)
Proc. ASIACRYPT 2008
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
9
-
-
74049103479
-
Proofs of retrievability for large files
-
Ning, P., De Capitani di Vimercati, S. and Syverson, P.F. (eds), Alexandria, VA, USA, October 29-November 2, ACM
-
Juels, A. and Pors, B.S.K. Jr. (2007) Proofs of Retrievability for Large Files. In Ning, P., De Capitani di Vimercati, S. and Syverson, P.F. (eds), Proc. CCS 2007, Alexandria, VA, USA, October 29-November 2, pp. 584-597. ACM.
-
(2007)
Proc. CCS 2007
, pp. 584-597
-
-
Juels, A.1
Pors, B.S.K.2
-
10
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
Wang, C., Ren, K., Lou, W. and Li, J. (2010) Toward publicly auditable secure cloud data storage services. IEEE Network, 24, 19-24.
-
(2010)
IEEE Network
, vol.24
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
11
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W. (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput., 62, 362-375.
-
(2013)
IEEE Trans. Comput.
, vol.62
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
12
-
-
84983104598
-
On defining proofs of knowledge
-
Brickell, E.F. (eds), Santa Barbara, CA, USA, August 16-20, Lecture Notes in Computer Science, Springer, Berlin
-
Bellare, M. and Goldreich, O. (1992) On Defining Proofs of Knowledge. In Brickell, E.F. (eds), Proc. CRYPTO 1992, Santa Barbara, CA, USA, August 16-20, Lecture Notes in Computer Science, Vol. 740, pp. 390-420. Springer, Berlin.
-
(1992)
Proc. CRYPTO 1992
, vol.740
, pp. 390-420
-
-
Bellare, M.1
Goldreich, O.2
-
13
-
-
79959823910
-
Remote data checking using provable data possession
-
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z.N.J. and Song, D. (2011) Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur., 14, 1-34.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, pp. 1-34
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.N.J.7
Song, D.8
-
14
-
-
85016272824
-
Auditing to keep online storage services honest
-
Hunt, G.C. (eds), San Diego, CA, USA, May, USENIX Association, CA, USA
-
Shah, M.A., Baker, M.J., Mogul, C. and Swaminathan, R. (2007) Auditing to Keep Online Storage Services Honest. In Hunt, G.C. (eds), Proc. HotOS 2007, San Diego, CA, USA, May, pp. 1-6. USENIX Association, CA, USA.
-
(2007)
Proc. HotOS 2007
, pp. 1-6
-
-
Shah, M.A.1
Baker, M.J.2
Mogul, C.3
Swaminathan, R.4
-
15
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Smart, N.P. (eds), Istanbul, Turkey, April 13-17, Lecture Notes in Computer Science 4965, Springer, Berlin
-
Groth, J. and Sahai, A. (2008) Efficient Non-Interactive Proof Systems for Bilinear Groups. In Smart, N.P. (eds), Proc. EUROCRYPT 2008, Istanbul, Turkey, April 13-17, Lecture Notes in Computer Science 4965, pp. 415-432. Springer, Berlin.
-
(2008)
Proc. EUROCRYPT 2008
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
16
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B. and Shacham, H.(2004) Short signatures from the weil pairing. J. Cryptology, 17, 297-319.
-
(2004)
J. Cryptology
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
17
-
-
84920380941
-
Protocols for public key cryptosystems
-
Oakland, CA, USA, April 14-16, IEEE Computer Society
-
Merkle, R.C. (1980) Protocols for Public Key Cryptosystems. In Proc. IEEE Symp. Security and Privacy 1980, Oakland, CA, USA, April 14-16, pp. 122-134. IEEE Computer Society.
-
(1980)
Proc. IEEE Symp. Security and Privacy 1980
, pp. 122-134
-
-
Merkle, R.C.1
|