-
1
-
-
2442532722
-
Health related virtual communities and electronic support groups: systematic review of the effects of online peer to peer interactions
-
Eysenbach G., Powell J., Englesakis M., Rizo C., Stern A. Health related virtual communities and electronic support groups: systematic review of the effects of online peer to peer interactions. Br Med J 2004, 328(7449):1166.
-
(2004)
Br Med J
, vol.328
, Issue.7449
, pp. 1166
-
-
Eysenbach, G.1
Powell, J.2
Englesakis, M.3
Rizo, C.4
Stern, A.5
-
2
-
-
77649172678
-
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
-
Sun J., Fang Y., Zhu X. Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wireless Commun 2010, 17(1):51-58.
-
(2010)
IEEE Wireless Commun
, vol.17
, Issue.1
, pp. 51-58
-
-
Sun, J.1
Fang, Y.2
Zhu, X.3
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, et al. Provable data possession at untrusted stores. In: CCS'07; 2007. p. 598-609.
-
(2007)
CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
-
4
-
-
71649085967
-
Scalable and efficient provable data possession
-
SecureComm 2008, art. no. 9
-
Ateniese G, DiPietro R, Mancini LV, Tsudik G. Scalable and efficient provable data possession. In: SecureComm 2008, art. no. 9; 2008.
-
(2008)
-
-
Ateniese, G.1
DiPietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
6
-
-
46649083439
-
Efficient remote data integrity checking in critical information infrastructures
-
Sebé F., Domingo-Ferrer J., Martínez-Ballesté A., Deswarte Y., Quisquater J. Efficient remote data integrity checking in critical information infrastructures. IEEE Trans Knowledge Data Eng 2008, 20(8):1-6.
-
(2008)
IEEE Trans Knowledge Data Eng
, vol.20
, Issue.8
, pp. 1-6
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Deswarte, Y.4
Quisquater, J.5
-
7
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Wang H. Proxy provable data possession in public clouds. IEEE Trans Service Comput 2013, 6(4):551-559.
-
(2013)
IEEE Trans Service Comput
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
8
-
-
84930643792
-
On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage
-
Wang H., Zhang Y. On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans Parallel Distrib Syst 2013, 25(1):264-267.
-
(2013)
IEEE Trans Parallel Distrib Syst
, vol.25
, Issue.1
, pp. 264-267
-
-
Wang, H.1
Zhang, Y.2
-
9
-
-
84927940045
-
Identity-based distributed provable data possession in multi-cloud storage
-
doi:10.1109/TSC.2014.1
-
Wang H. Identity-based distributed provable data possession in multi-cloud storage. IEEE Trans Service Comput 2014. doi:10.1109/TSC.2014.1.
-
(2014)
IEEE Trans Service Comput
-
-
Wang, H.1
-
10
-
-
84894562939
-
Identity-based remote data possession checking in public clouds
-
doi:10.1049/iet-ifs.2012.0271
-
Wang H, Wu Q, Qin B, Domingo-Ferrer J. Identity-based remote data possession checking in public clouds. IET Inf Secur 2013. doi:10.1049/iet-ifs.2012.0271.
-
(2013)
IET Inf Secur
-
-
Wang, H.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
-
11
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS. Efficient provable data possession for hybrid clouds. In: CCS'10; 2010. p. 756-8.
-
(2010)
CCS'10
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
12
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multi-cloud storage
-
Zhu Y., Hu H., Ahn G.J., Yu M. Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans Parallel Distrib Syst 2012, 23(12):2231-2244.
-
(2012)
IEEE Trans Parallel Distrib Syst
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yu, M.4
-
13
-
-
51849117195
-
MR-RDIC: multiple-replica provable data possession
-
Curtmola R, Khan O, Burns R, Ateniese G, MR-RDIC: multiple-replica provable data possession. In: ICDCS'08; 2008. p. 411-20.
-
(2008)
ICDCS'08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
14
-
-
84888362150
-
On the security of auditing mechanisms for secure cloud storage
-
Yu Y., Niu L., Yang G., Mu Y., Susilo W. On the security of auditing mechanisms for secure cloud storage. Future Gen Comput Syst 2014, 30:127-132.
-
(2014)
Future Gen Comput Syst
, vol.30
, pp. 127-132
-
-
Yu, Y.1
Niu, L.2
Yang, G.3
Mu, Y.4
Susilo, W.5
-
15
-
-
84905221667
-
On indistinguishability in remote data integrity checking
-
[in press]. doi:10.1093/comjnl/bxt137
-
Fan X, Yang G, Mu Y, Yu Y. On indistinguishability in remote data integrity checking. Comput J 2013. [in press]. doi:10.1093/comjnl/bxt137.
-
(2013)
Comput J
-
-
Fan, X.1
Yang, G.2
Mu, Y.3
Yu, Y.4
-
16
-
-
74049103479
-
PoRs: proofs of retrievability for large files
-
Juels A, Kaliski Jr BS. PoRs: proofs of retrievability for large files. In: CCS'07; 2007. p. 584-97.
-
(2007)
CCS'07
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr, B.S.2
-
17
-
-
58349118819
-
Compact proofs of retrievability
-
Shacham H, Waters B. Compact proofs of retrievability. In: Asiacrypt; 2008. p. 90-107.
-
(2008)
Asiacrypt
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
18
-
-
79952791500
-
Fair and dynamic proofs of retrievability
-
Zheng Q, Xu S. Fair and dynamic proofs of retrievability. In: CODASPY'11; 2011. p. 237-48.
-
(2011)
CODASPY'11
, pp. 237-248
-
-
Zheng, Q.1
Xu, S.2
-
19
-
-
74049136395
-
Proofs of retrievability: theory and implementation
-
Bowers KD, Juels A, Oprea A. Proofs of retrievability: theory and implementation. In: CCSW'09; 2009. p. 43-54.
-
(2009)
CCSW'09
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
20
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Dodis Y, Vadhan S, Wichs D. Proofs of retrievability via hardness amplification. In: TCC; 2009. p. 109-27.
-
(2009)
TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
21
-
-
79960836433
-
Zero-knowledge proofs of retrievability
-
Zhu Y., Wang H., Hu Z., Ahn G.J., Hu H. Zero-knowledge proofs of retrievability. Sci China Inf Sci 2011, 54(5):1608-1617.
-
(2011)
Sci China Inf Sci
, vol.54
, Issue.5
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
-
22
-
-
84863392301
-
HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Wan Z., Liu J., Deng R. HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 2012, 7(2):743-754.
-
(2012)
IEEE Trans Inf Forensics Secur
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.3
-
23
-
-
84888840097
-
Simultaneous authentication and secrecy in identity-based data upload to cloud
-
Qin B., Wang H., Wu Q., Liu J., Domingo-Ferrer J. Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Comput 2013, 16(4):845-859.
-
(2013)
Cluster Comput
, vol.16
, Issue.4
, pp. 845-859
-
-
Qin, B.1
Wang, H.2
Wu, Q.3
Liu, J.4
Domingo-Ferrer, J.5
-
24
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Crypto; 2001. p. 213-29.
-
(2001)
Crypto
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
25
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji A., Nakabayashi M., Takano S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans Fundam 2001, 5:1234-1243.
-
(2001)
IEICE Trans Fundam
, vol.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
26
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Asiacrypt; 2001. p. 514-32.
-
(2001)
Asiacrypt
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
27
-
-
84905279534
-
-
jPBC - Java pairing-based cryptography library. Università degli Studi di Salerno. < [accessed 07.02.14].
-
De Caro A. jPBC - Java pairing-based cryptography library. Università degli Studi di Salerno. < [accessed 07.02.14]. http://gas.dia.unisa.it/projects/jpbc/index.html.
-
-
-
De Caro, A.1
-
28
-
-
84905221668
-
-
PBC library - pairing-based cryptography. Stanford University. [accessed 07.02.14].
-
Lynn B. PBC library - pairing-based cryptography. Stanford University. [accessed 07.02.14]. http://crypto.stanford.edu/pbc.
-
-
-
Lynn, B.1
-
29
-
-
84905279535
-
-
PBC library manual 0.5.11. Stanford University
-
Lynn B. PBC library manual 0.5.11. Stanford University; 2006. http://crypto.stanford.edu/pbc/manual.pdf.
-
(2006)
-
-
Lynn, B.1
-
30
-
-
81055144591
-
Delegable provable data possession for remote data in the clouds
-
Shen ST, Tzeng WG. Delegable provable data possession for remote data in the clouds. In: ICICS; 2011. p. 93-111.
-
(2011)
ICICS
, pp. 93-111
-
-
Shen, S.T.1
Tzeng, W.G.2
-
31
-
-
84867663875
-
Publicly auditable provable data possession scheme for outsourced data in the public cloud using polynomial interpolation
-
Purushothama BR, Amberker BB. Publicly auditable provable data possession scheme for outsourced data in the public cloud using polynomial interpolation. In: SNDS; 2012. p. 11-22.
-
(2012)
SNDS
, pp. 11-22
-
-
Purushothama, B.R.1
Amberker, B.B.2
|