-
1
-
-
84916622798
-
-
Open Security Foundation: DataLossDB
-
Open Security Foundation: DataLossDB. http://datalossdb.org/
-
-
-
-
2
-
-
78249279921
-
Multi-level comparison of data deduplication in a backup scenario
-
ACM, New York
-
Meister, D., Brinkmann, A.: Multi-level comparison of data deduplication in a backup scenario. In: SYSTOR ’09, pp. 8:1–8:12. ACM, New York (2009)
-
(2009)
SYSTOR ’09
, pp. 8:1-8:12
-
-
Meister, D.1
Brinkmann, A.2
-
3
-
-
84994675427
-
Demystifying data deduplication
-
ACM, New York
-
Mandagere, N., Zhou, P., Smith, M.A., Uttamchandani, S.: Demystifying data deduplication. In: Middleware ’08, pp. 12–17. ACM, New York (2008)
-
(2008)
Middleware ’08
, pp. 12-17
-
-
Mandagere, N.1
Zhou, P.2
Smith, M.A.3
Uttamchandani, S.4
-
4
-
-
78751469775
-
The design of a similarity based deduplication system
-
Aronovich, L., Asher, R., Bachmat, E., Bitner, H., Hirsch, M., Klein, S.T.: The design of a similarity based deduplication system. In: SYSTOR ’09, pp. 6:1–6:14 (2009)
-
(2009)
SYSTOR ’09
, pp. 6:1-6:14
-
-
Aronovich, L.1
Asher, R.2
Bachmat, E.3
Bitner, H.4
Hirsch, M.5
Klein, S.T.6
-
5
-
-
84916622797
-
-
Understanding data de-duplication ratios. SNIA forum
-
Dutch, M., Freeman, L.: Understanding data de-duplication ratios. SNIA forum (2008). http://www.snia.org/sites/default/files/Understanding DataDeduplication Ratios-20080718.pdf
-
(2008)
-
-
Dutch, M.1
Freeman, L.2
-
6
-
-
84866168915
-
Estimation of deduplication ratios in large data sets
-
April
-
Harnik, D., Margalit, O., Naor, D., Sotnikov, D., Vernik, G.: Estimation of deduplication ratios in large data sets. In: IEEE MSST ’12, pp. 1–11, April 2012
-
(2012)
IEEE MSST ’12
, pp. 1-11
-
-
Harnik, D.1
Margalit, O.2
Naor, D.3
Sotnikov, D.4
Vernik, G.5
-
7
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side channels in cloud services: deduplication in cloud storage. IEEE Security Privacy 8(6), 40–47 (2010)
-
(2010)
IEEE Security Privacy
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
8
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
ACM, New York
-
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: CCS ’11, pp. 491–500. ACM, New York (2011)
-
(2011)
CCS ’11
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
9
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
ACM, New York
-
Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS ’12, pp. 81–82. ACM, New York (2012)
-
(2012)
ASIACCS ’12
, pp. 81-82
-
-
Di Pietro, R.1
Sorniotti, A.2
-
10
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
IEEE Computer Society, Washington, DC
-
Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: ICDCS ’02, pp. 617–632. IEEE Computer Society, Washington, DC (2002)
-
(2002)
ICDCS ’02
, pp. 617-632
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
11
-
-
70349237760
-
Secure data deduplication
-
ACM, New York
-
Storer, M.W., Greenan, K., Long, D.D., Miller, E.L.: Secure data deduplication. In: StorageSS ’08, pp. 1–10. ACM, New York (2008)
-
(2008)
StorageSS ’08
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
12
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
-
Bellare, M., Keelveedhi, S., Ristenpart, T.: Message-locked encryption and secure deduplication. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 296–312. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
13
-
-
84877968673
-
.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
Xu, J., Chang, E.C., Zhou, J.: Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In: 8th ACM SIGSAC Symposium, pp. 195–206
-
8th ACM SIGSAC Symposium
, pp. 195-206
-
-
Xu, J.1
Chang, E.C.2
Zhou, J.3
-
14
-
-
85052022812
-
DupLESS: Server-aided encryption for deduplicated storage
-
Bellare, M., Keelveedhi, S., Ristenpart, T.: DupLESS: server-aided encryption for deduplicated storage. In: 22nd USENIX Conference on Security, pp. 179–194 (2013)
-
(2013)
22nd USENIX Conference on Security
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
15
-
-
84947273682
-
The sybil attack
-
In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.), Springer, Heidelberg
-
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
-
(2002)
IPTPS 2002. LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
17
-
-
84868107467
-
Confidentiality as a service-usable security for the cloud
-
Fahl, S., Harbach, M., Muders, T., Smith, M.: Confidentiality as a service-usable security for the cloud. In: TrustCom 2012, pp. 153–162 (2012)
-
(2012)
TrustCom 2012
, pp. 153-162
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
-
18
-
-
84865031605
-
Helping johnny 2.0 to encrypt his facebook conversations
-
Fahl, S., Harbach, M., Muders, T., Smith, M., Sander, U.: Helping johnny 2.0 to encrypt his facebook conversations. In: SOUPS 2012, pp. 11–28 (2012)
-
(2012)
SOUPS 2012
, pp. 11-28
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
Sander, U.5
-
19
-
-
84873963079
-
Secret handshakes with dynamic and fuzzy matching
-
Ateniese, G., Blanton, M., Kirsch, J.: Secret handshakes with dynamic and fuzzy matching. In: NDSS ’07 (2007)
-
(2007)
NDSS ’07
-
-
Ateniese, G.1
Blanton, M.2
Kirsch, J.3
-
20
-
-
0018545449
-
How to share a secret. Commun
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
-
(1979)
ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: ACM CCS ’06, pp. 89–98 (2006)
-
(2006)
ACM CCS ’06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
22
-
-
0036038991
-
Universally composable twoparty and multi-party secure computation
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable twoparty and multi-party secure computation. In: STOC ’02 (2002)
-
(2002)
STOC ’02
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
23
-
-
33750024803
-
Balancing accountability and privacy using e-cash (extended abstract)
-
In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
-
Camenisch, J.L., Hohenberger, S., Lysyanskaya, A.: Balancing accountability and privacy using e-cash (extended abstract). In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 141–155. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 141-155
-
-
Camenisch, J.L.1
Hohenberger, S.2
Lysyanskaya, A.3
-
24
-
-
67651053584
-
Pseudonym systems (extended abstract)
-
In: Heys, H.M., Adams, C.M. (eds.), Springer, Heidelberg
-
Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems (extended abstract). In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 184–199. Springer, Heidelberg (2000)
-
(2000)
SAC 1999. LNCS
, vol.1758
, pp. 184-199
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahai, A.3
Wolf, S.4
|