-
3
-
-
38149054118
-
-
PBC Library. http://crypto.stanford.edu/pbc/, 2007.
-
(2007)
PBC Library
-
-
-
4
-
-
84889035860
-
-
Jerasure. https://github.com/tsuraan/Jerasure, 2008.
-
(2008)
Jerasure
-
-
-
11
-
-
74049102823
-
Provable data possession at untrusted stores
-
ATENIESE, G., BURNS, R. C., CURTMOLA, R., HERRING, J., KISSNER, L., PETERSON, Z. N. J., AND SONG, D. X. Provable data possession at untrusted stores. In ACM Conference on Computer and Communications Security (2007), pp. 598-609.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.C.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.N.J.6
Song, D.X.7
-
12
-
-
71649085967
-
Scalable and efficient provable data possession
-
ATENIESE, G., PIETRO, R. D., MANCINI, L. V., AND TSUDIK, G. Scalable and efficient provable data possession. IACR Cryptology ePrint Archive 2008 (2008), 114.
-
(2008)
IACR Cryptology EPrint Archive 2008
, pp. 114
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
13
-
-
23044435711
-
Short signatures from the weil pairing
-
BONEH, D., LYNN, B., AND SHACHAM, H. Short signatures from the weil pairing. J. Cryptology 17, 4 (2004), 297-319.
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
14
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
BOWERS, K. D., JUELS, A., AND OPREA, A. HAIL: a high-availability and integrity layer for cloud storage. In ACM Conference on Computer and Communications Security (2009), pp. 187-198.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
15
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
BOWERS, K. D., JUELS, A., AND OPREA, A. Proofs of retrievability: theory and implementation. In CCSW (2009), pp. 43-54.
-
(2009)
CCSW
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
16
-
-
80755144004
-
How to tell if your cloud files are vulnerable to drive crashes
-
BOWERS, K. D., VAN DIJK, M., JUELS, A., OPREA, A., AND RIVEST, R. L. How to tell if your cloud files are vulnerable to drive crashes. In ACM Conference on Computer and Communications Security (2011), pp. 501-514.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 501-514
-
-
Bowers, K.D.1
Van Dijk, M.2
Juels, A.3
Oprea, A.4
Rivest, R.L.5
-
17
-
-
84883411598
-
Dynamic proofs of retrievability via oblivious RAM
-
CASH, D., KÜPÇÜ, A., AND WICHS, D. Dynamic Proofs of Retrievability via Oblivious RAM. In EUROCRYPT (2013), pp. 279-295.
-
(2013)
EUROCRYPT
, pp. 279-295
-
-
Cash, D.1
Küpçü, A.2
Wichs, D.3
-
19
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
CURTMOLA, R., KHAN, O., BURNS, R. C., AND ATENIESE, G. MR-PDP: Multiple-Replica Provable Data Possession. In ICDCS (2008), pp. 411-420.
-
(2008)
ICDCS
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.C.3
Ateniese, G.4
-
21
-
-
84889070207
-
Powerstore: Proofs of writing for efficient and robust storage
-
ACM
-
DOBRE, D., KARAME, G., LI, W., MAJUNTKE, M., SURI, N., AND VUKOLíC, M. Powerstore: Proofs of writing for efficient and robust storage. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (New York, NY, USA, 2013), CCS '13, ACM, pp. 285-298.
-
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (New York, NY, USA, 2013), CCS '13
, pp. 285-298
-
-
Dobre, D.1
Karame, G.2
Li, W.3
Majuntke, M.4
Suri, N.5
Vukolíc, M.6
-
22
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
DODIS, Y., VADHAN, S. P., AND WICHS, D. Proofs of Retrievability via Hardness Amplification. In TCC (2009), pp. 109-127.
-
(2009)
TCC
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.P.2
Wichs, D.3
-
23
-
-
74049121230
-
Dynamic provable data possession
-
ERWAY, C. C., KÜPÇÜ, A., PAPAMANTHOU, C., AND TAMASSIA, R. Dynamic provable data possession. In ACM Conference on Computer and Communications Security (2009), pp. 213-222.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
25
-
-
84869455769
-
Double-spending fast payments in bitcoin
-
ACM
-
KARAME, G. O., ANDROULAKI, E., AND CAPKUN, S. Double-spending fast payments in bitcoin. In Proceedings of the 2012 ACM conference on Computer and communications security (New York, NY, USA, 2012), CCS '12, ACM, pp. 906-917.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS '12
, pp. 906-917
-
-
Karame, G.O.1
Androulaki, E.2
Capkun, S.3
-
26
-
-
84890039053
-
A fistful of bitcoins: Characterizing payments among men with no names
-
ACM
-
MEIKLEJOHN, S., POMAROLE, M., JORDAN, G., LEVCHENKO, K., MCCOY, D., VOELKER, G. M., AND SAVAGE, S. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference (New York, NY, USA, 2013), IMC '13, ACM, pp. 127-140.
-
Proceedings of the 2013 Conference on Internet Measurement Conference (New York, NY, USA, 2013), IMC '13
, pp. 127-140
-
-
Meiklejohn, S.1
Pomarole, M.2
Jordan, G.3
Levchenko, K.4
McCoy, D.5
Voelker, G.M.6
Savage, S.7
-
27
-
-
84910663706
-
-
NETEM. NetEm, the Linux Foundation. Website, 2009. Available online at http://www.linuxfoundation.org/collaborate/workgroups/networking/netem.
-
(2009)
-
-
NETEM1
-
28
-
-
84880237695
-
A position paper on data sovereignty: The importance of geolocating data in the cloud
-
USENIX Association
-
PETERSON, Z. N. J., GONDREE, M., AND BEVERLY, R. A position paper on data sovereignty: The importance of geolocating data in the cloud. In Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing (Berkeley, CA, USA, 2011), HotCloud'11, USENIX Association, pp. 9-9.
-
Proceedings of the 3rd USENIX Conference on Hot Topics in Cloud Computing (Berkeley, CA, USA, 2011), HotCloud'11
, pp. 9-9
-
-
Peterson, Z.N.J.1
Gondree, M.2
Beverly, R.3
-
29
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
H. Y. Youm and Y. Won, Eds., ACM
-
PIETRO, R. D., AND SORNIOTTI, A. Boosting efficiency and security in proof of ownership for deduplication. In ASIACCS (2012), H. Y. Youm and Y. Won, Eds., ACM, pp. 81-82.
-
(2012)
ASIACCS
, pp. 81-82
-
-
Pietro, R.D.1
Sorniotti, A.2
-
30
-
-
80955144922
-
Enabling security in cloud storage SLAs with CloudProof
-
USENIX Association
-
POPA, R. A., LORCH, J. R., MOLNAR, D., WANG, H. J., AND ZHUANG, L. Enabling Security in Cloud Storage SLAs with CloudProof. In Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2011), USENIXATC'11, USENIX Association, pp. 31-31.
-
Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (Berkeley, CA, USA, 2011), USENIXATC'11
, pp. 31-31
-
-
Popa, R.A.1
Lorch, J.R.2
Molnar, D.3
Wang, H.J.4
Zhuang, L.5
-
31
-
-
84856188619
-
An analysis of anonymity in the bitcoin system
-
REID, F., AND HARRIGAN, M. An Analysis of Anonymity in the Bitcoin System. CoRR (2011).
-
(2011)
CoRR
-
-
Reid, F.1
Harrigan, M.2
-
32
-
-
84891769451
-
Designated-verifier provable data possession in public cloud storage
-
REN, Y., XU, J., WANG, J., AND KIM, J.-U. Designated-verifier provable data possession in public cloud storage. International Journal of Security and Its Applications 7, 6 (2013), 11-20.
-
(2013)
International Journal of Security and Its Applications
, vol.7
, Issue.6
, pp. 11-20
-
-
Ren, Y.1
Xu, J.2
Wang, J.3
Kim, J.-U.4
-
34
-
-
85032873931
-
Efficient identification and signatures for smart cards (abstract)
-
J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer
-
SCHNORR, C.-P. Efficient identification and signatures for smart cards (abstract). In EUROCRYPT (1989), J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer, pp. 688-689.
-
(1989)
EUROCRYPT
, pp. 688-689
-
-
Schnorr, C.-P.1
-
35
-
-
58349118819
-
Compact proofs of retrievability
-
SHACHAM, H., AND WATERS, B. Compact Proofs of Retrievability. In ASIACRYPT (2008), pp. 90-107.
-
(2008)
ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
36
-
-
81055144591
-
Delegable provable data possession for remote data in the clouds
-
S. Qing, W. Susilo, G. Wang, and D. Liu, Eds., vol. 7043 of Lecture Notes in Computer Science, Springer
-
SHEN, S.-T., AND TZENG, W.-G. Delegable provable data possession for remote data in the clouds. In ICICS (2011), S. Qing, W. Susilo, G. Wang, and D. Liu, Eds., vol. 7043 of Lecture Notes in Computer Science, Springer, pp. 93-111.
-
(2011)
ICICS
, pp. 93-111
-
-
Shen, S.-T.1
Tzeng, W.-G.2
-
37
-
-
84888986259
-
Practical dynamic proofs of retrievability
-
A.-R. Sadeghi, V. D. Gligor, and M. Yung, Eds., ACM
-
SHI, E., STEFANOV, E., AND PAPAMANTHOU, C. Practical dynamic proofs of retrievability. In ACM Conference on Computer and Communications Security (2013), A.-R. Sadeghi, V. D. Gligor, and M. Yung, Eds., ACM, pp. 325-336.
-
(2013)
ACM Conference on Computer and Communications Security
, pp. 325-336
-
-
Shi, E.1
Stefanov, E.2
Papamanthou, C.3
-
38
-
-
84869808633
-
Lost: Location based storage
-
T. Yu, S. Capkun, and S. Kamara, Eds., ACM
-
WATSON, G. J., SAFAVI-NAINI, R., ALIMOMENI, M., LOCASTO, M. E., AND NARAYAN, S. Lost: location based storage. In CCSW (2012), T. Yu, S. Capkun, and S. Kamara, Eds., ACM, pp. 59-70.
-
(2012)
CCSW
, pp. 59-70
-
-
Watson, G.J.1
Safavi-Naini, R.2
Alimomeni, M.3
Locasto, M.E.4
Narayan, S.5
|