-
1
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., et al., 2007. Provable data possession at untrusted stores. Proc. 14th ACM Conf. on Computer and Communications Security, p.598–609. [doi:10.1145/1315245.1315318]
-
(2007)
Proc. 14th ACM Conf. on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
2
-
-
70249129465
-
Scalable and efficient provable data possession
-
Ateniese, G., di Pietro, R., Mancini, L.V., et al., 2008. Scalable and efficient provable data possession. Proc. 4th Int. Conf. on Security and Privacy in Communication Networks, Article 9. [doi:10.1145/1460877.1460889]
-
(2008)
Proc. 4th Int. Conf. on Security and Privacy in Communication Networks
-
-
Ateniese, G.1
di Pietro, R.2
Mancini, L.V.3
-
3
-
-
79959823910
-
Remote data checking using provable data possession
-
Ateniese, G., Burns, R., Curtmola, R., et al., 2011. Remote data checking using provable data possession. ACM Trans. Inform. Syst. Secur., 14(1):1–12. [doi:10.1145/ 1952982.1952994]
-
(2011)
ACM Trans. Inform. Syst. Secur.
, vol.14
, Issue.1
, pp. 1-12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
-
4
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
Boneh, D., Boyen, X., 2004. Efficient selective-ID secure identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT, p.223–238.
-
(2004)
Advances in Cryptology-EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Boneh, D., Boyen, X., Goh, E.J., 2005. Hierarchical identity based encryption with constant size ciphertext. Advances in Cryptology-EUROCRYPT, p.440–456. [doi:10.1007/11426639_26]
-
(2005)
Advances in Cryptology-EUROCRYPT
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.J.3
-
8
-
-
74049121230
-
Dynamic provable data possession
-
Erway, C., Kupcu, A., Papamanthou, C., et al., 2009. Dynamic provable data possession. Proc. 16th ACM Conf. on Computer and Communications Security, p.213–222. [doi:10.1145/1653662.1653688]
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
-
12
-
-
79960900327
-
A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
-
Hao, Z., Zhong, S., Yu, N.H., 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng., 23(9):1432–1437. [doi:10.1109/TKDE.2011.62]
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.9
, pp. 1432-1437
-
-
Hao, Z.1
Zhong, S.2
Yu, N.H.3
-
13
-
-
84887724123
-
An analysis of security issues for cloud computing
-
Hashizume, K., Rosado, D.G., Fernandez-Medina, E., et al., 2013. An analysis of security issues for cloud computing. J. Internet Serv. Appl., 4:5. [doi:10.1186/1869-0238-4-5]
-
(2013)
J. Internet Serv. Appl.
, vol.4
, pp. 5
-
-
Hashizume, K.1
Rosado, D.G.2
Fernandez-Medina, E.3
-
14
-
-
85006576181
-
-
Hochmuth, P., Richmond, C., Hudson, S., et al., 2013. 2013 U.S. Cloud Security Survey. Technical Report No. 242836, International Data Corporation (IDC), USA. Available from http://www.idc.com/getdoc.jsp? containerId=242836.
-
(2013)
2013 U.S. Cloud Security Survey. Technical Report No. 242836, International Data Corporation (IDC), USA
-
-
Hochmuth, P.1
Richmond, C.2
Hudson, S.3
-
16
-
-
84893408486
-
A study of incremental cryptography for security schemes in mobile cloud computing environments
-
Khan, A., Kiah, M.L.M., Khan, S.U., et al., 2013a. A study of incremental cryptography for security schemes in mobile cloud computing environments. IEEE Symp. on Wireless Technology and Applications, p.62–67. [doi:10.1109/ISWTA.2013.6688818]
-
(2013)
IEEE Symp. on Wireless Technology and Applications
, pp. 62-67
-
-
Khan, A.1
Kiah, M.L.M.2
Khan, S.U.3
-
17
-
-
84894666247
-
A survey of mobile cloud computing application models
-
Khan, A., Othman, M., Madani, S.A., et al., 2013b. A survey of mobile cloud computing application models. IEEE Commun. Surv. Tutor., 16(1):393–413. [doi:10.1109/SURV.2013.062613.00160]
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.1
, pp. 393-413
-
-
Khan, A.1
Othman, M.2
Madani, S.A.3
-
19
-
-
85006602970
-
-
Mell, P., Grance, T., 2009. The NIST Definition of Cloud Computing. Technical Report No. SP 800-145, National Institute of Standards and Techninology (NIST), USA.
-
(2009)
The NIST Definition of Cloud Computing. Technical Report No. SP 800-145, National Institute of Standards and Techninology (NIST), USA
-
-
Mell, P.1
Grance, T.2
-
20
-
-
74049152260
-
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
-
Ristenpart, T., Tromer, E., Shacham, H., et al., 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. Proc. 16th ACM Conf. on Computer and Communications Security, p.199–212. [doi:10.1145/1653662.1653687]
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
-
22
-
-
84878998883
-
Compact proofs of retrievability
-
Shacham, H., Waters, B., 2013. Compact proofs of retrievability. J. Cryptol., 26(3):442–483. [doi:10.1007/s00145-012-9129-2]
-
(2013)
J. Cryptol.
, vol.26
, Issue.3
, pp. 442-483
-
-
Shacham, H.1
Waters, B.2
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Shamir, A., 1985. Identity-based cryptosystems and signature schemes. Advances in Cryptology-ASIACRYPT, p.47–53. [doi:10.1007/3-540-39568-7_5]
-
(1985)
Advances in Cryptology-ASIACRYPT
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., et al., 2009. Ensuring data storage security in cloud computing. 17th Int. Workshop on Quality of Service, p.1–9. [doi:10.1109/IWQoS.2009.5201385]
-
(2009)
17th Int. Workshop on Quality of Service
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
-
25
-
-
77953295132
-
Privacypreserving public auditing for data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., et al., 2010. Privacypreserving public auditing for data storage security in cloud computing. Proc. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462173]
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
-
26
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
Wang, C., Wang, Q., Ren, K., et al., 2012. Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput., 5(2):220–232. [doi:10.1109/TSC.2011.24]
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
-
27
-
-
84861959172
-
Privacypreserving public auditing for secure cloud storage
-
Wang, C., Chow, S., Wang, Q., et al., 2013. Privacypreserving public auditing for secure cloud storage. IEEE Trans. Comput., 62(2):362–375. [doi:10.1109/TC.2011.245]
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.2
Wang, Q.3
-
28
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Wang, Q., Wang, C., Li, J., et al., 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security-ESORICS, p.355–370. [doi:10.1007/978-3-642-04444-1_22]
-
(2009)
Computer Security-ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
-
29
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Waters, B., 2005. Efficient identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT, p.114–127. [doi:10.1007/11426639_7]
-
(2005)
Advances in Cryptology-EUROCRYPT
, pp. 114-127
-
-
Waters, B.1
-
30
-
-
84863270564
-
Collaborative integrity verification in hybrid clouds
-
Zhu, Y., Hu, H.X., Ahn, G.J., et al., 2011a. Collaborative integrity verification in hybrid clouds. 7th Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), p.191–200.
-
(2011)
7th Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
, pp. 191-200
-
-
Zhu, Y.1
Hu, H.X.2
Ahn, G.J.3
-
31
-
-
79960836433
-
Zero-knowledge proofs of retrievability
-
Zhu, Y., Wang, H.X., Hu, Z.X., et al., 2011b. Zero-knowledge proofs of retrievability. Sci. China Inform. Sci., 54(8):1608–1617. [doi:10.1007/s11432-011-4293-9]
-
(2011)
Sci. China Inform. Sci.
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.X.2
Hu, Z.X.3
|