-
1
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.). ACM
-
Juels, A., Kaliski Jr., B.S.: Pors: proofs of retrievability for large files. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 584-597. ACM (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Juels, A.1
Kaliski Jr., B.S.2
-
2
-
-
58349118819
-
Compact proofs of retrievability
-
In: Pieprzyk, J. (ed.) Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
3
-
-
79959823910
-
Remote data checking using provable data possession
-
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12 (2011)
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.N.J.7
Song, D.8
-
4
-
-
84871943322
-
Towards efficient proofs of retrievability
-
Xu, J., Chang, E.C.: Towards efficient proofs of retrievability. In: ASIACCS, pp. 79-80 (2012)
-
(2012)
ASIACCS
, pp. 79-80
-
-
Xu, J.1
Chang, E.C.2
-
5
-
-
84872103252
-
Iris: A scalable cloud file system with efficient integrity checks
-
Stefanov, E., van Dijk, M., Juels, A., Oprea, A.: Iris: a scalable cloud file system with efficient integrity checks. In: ACSAC, pp. 229-238 (2012)
-
(2012)
ACSAC
, pp. 229-238
-
-
Stefanov, E.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
-
8
-
-
84864269507
-
PRISM-Privacy-preserving search in mapreduce
-
In: Fischer-Hubner, S., Wright, M. (eds.) Springer, Heidelberg
-
Blass, E.-O., Di Pietro, R., Molva, R., O nen, M.: PRISM-Privacy- Preserving Search in MapReduce. In: Fischer-Hubner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 180-200. Springer, Heidelberg (2012)
-
(2012)
PETS 2012. LNCS
, vol.7384
, pp. 180-200
-
-
Blass, E.-O.1
Di Pietro, R.2
Molva, R.3
Nen M, O..4
-
9
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM, New York
-
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm 2008, pp. 9:1-9:10. ACM, New York (2008)
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm 2008
, pp. 91-910
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
10
-
-
74049121230
-
Dynamic provable data possession
-
ACM, New York
-
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 213-222. ACM, New York (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
11
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
In: Backes, M., Ning, P. (eds.) Springer, Heidelberg
-
Wang, Q.,Wang, C., Li, J., Ren, K., Lou,W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355-370. Springer, Heidelberg (2009)
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
12
-
-
79952791500
-
Fair and dynamic proofs of retrievability
-
Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: CODASPY, pp. 237-248 (2011)
-
(2011)
CODASPY
, pp. 237-248
-
-
Zheng, Q.1
Xu, S.2
-
13
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
Wang, Q.,Wang, C., Ren, K., Lou,W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847-859 (2011)
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
14
-
-
84871950907
-
A dynamic proof of retrievability (por) scheme with o(logn) complexity
-
Mo, Z., Zhou, Y., Chen, S.: A dynamic proof of retrievability (por) scheme with o(logn) complexity. In: ICC, pp. 912-916 (2012)
-
(2012)
ICC
, pp. 912-916
-
-
Mo, Z.1
Zhou, Y.2
Chen, S.3
-
15
-
-
84866347734
-
Robust dynamic provable data possession
-
Chen, B., Curtmola, R.: Robust dynamic provable data possession. In: ICDCS Workshops, pp. 515-525 (2012)
-
(2012)
ICDCS Workshops
, pp. 515-525
-
-
Chen, B.1
Curtmola, R.2
-
16
-
-
84883411598
-
Dynamic proofs of retrievability via oblivious RAM
-
In: Johansson, T., Nguyen, P.Q. (eds.) Springer, Heidelberg
-
Cash, D., Kupcu, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 279-295. Springer, Heidelberg (2013)
-
(2013)
Eurocrypt 2013. LNCS
, vol.7881
, pp. 279-295
-
-
Cash, D.1
Kupcu, A.2
Wichs, D.3
-
17
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
Shi, E., Stefanov, E., Papamanthou, C.: Practical dynamic proofs of retrievability. In: ACM Conference on Computer and Communications Security, pp. 325-336 (2013)
-
(2013)
ACM Conference on Computer and Communications Security
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
18
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: a Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACMTrans. Netw. 8(3), 281-293 (2000)
-
(2000)
IEEE/ACMTrans. Netw.
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
19
-
-
35048891868
-
Keying hash functions for message authentication
-
In: Koblitz, N. (ed.) Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
20
-
-
84906494344
-
-
Technical report, EURECOM (June
-
Azraoui, M., Elkhiyaoui, K., Molva, R., Onen, M.: Stealthguard: Proofs of retrievability with hidden watchdogs. Technical report, EURECOM (June 2014)
-
(2014)
Stealthguard: Proofs of Retrievability with Hidden Watchdogs
-
-
Azraoui, M.1
Elkhiyaoui, K.2
Molva, R.3
Onen, M.4
-
21
-
-
79251555651
-
Efficient computationally private information retrieval from anonymity or trapdoor groups
-
In: Burmester, M., Tsudik, G.,Magliveras, S., Ilic, I. (eds.) Springer, Heidelberg
-
Trostle, J., Parrish, A.: Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. In: Burmester, M., Tsudik, G.,Magliveras, S., Ilic, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 114-128. Springer, Heidelberg (2011)
-
(2011)
ISC 2010. LNCS
, vol.6531
, pp. 114-128
-
-
Trostle, J.1
Parrish, A.2
-
22
-
-
74049102823
-
Provable data possession at untrusted stores
-
In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) . ACM
-
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 598-609. ACM (2007)
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.7
-
23
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. J. Cryptology 17(4), 297-319 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
78650828289
-
Constant-size commitments to polynomials and their applications
-
In: Abe, M. (ed.) Springer, Heidelberg
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177-194. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
|