-
1
-
-
84866761388
-
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
-
B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," Proc. IEEE Fifth Int'l Conf. Cloud Computing, pp. 295-302, 2012.
-
(2012)
Proc. IEEE Fifth Int'l Conf. Cloud Computing
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
2
-
-
77950347409
-
A View of Cloud Computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Comm. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
84862907810
-
Security Challenges for the Public Cloud
-
K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
4
-
-
84855974342
-
Cloud Data Protection for the Masses
-
D. Song, E. Shi, I. Fischer, and U. Shankar, "Cloud Data Protection for the Masses," Computer, vol. 45, no. 1, pp. 39-45, 2012.
-
(2012)
Computer
, vol.45
, Issue.1
, pp. 39-45
-
-
Song, D.1
Shi, E.2
Fischer, I.3
Shankar, U.4
-
5
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,"Proc. IEEE INFOCOM, pp. 525-533, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
6
-
-
84893597100
-
Computing Encrypted Cloud Data Efficiently under Multiple Keys
-
B. Wang, M. Li, S.S. Chow, and H. Li, "Computing Encrypted Cloud Data Efficiently under Multiple Keys," Proc. IEEE Conf. Comm. and Network Security (CNS '13), pp. 90-99, 2013.
-
(2013)
Proc. IEEE Conf. Comm. and Network Security (CNS '13)
, pp. 90-99
-
-
Wang, B.1
Li, M.2
Chow, S.S.3
Li, H.4
-
7
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
8
-
-
84923314186
-
-
The MD5 Message-Digest Algorithm (RFC1321)
-
The MD5 Message-Digest Algorithm (RFC1321). https://tools.ietf.org/html/rfc1321, 2014.
-
(2014)
-
-
-
9
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-610, 2007.
-
(2007)
th ACM Conf. Computer and Comm. Security (CCS '07)
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
14
-
-
78650081896
-
Remote Data Checking for Network Coding-Based Distributed Storage Systems
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-Based Distributed Storage Systems,"Proc. ACM Workshop Cloud Computing Security Workshop (CCSW'10), pp. 31-42, 2010.
-
(2010)
Proc. ACM Workshop Cloud Computing Security Workshop (CCSW'10)
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
15
-
-
79959325063
-
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S Yau, "Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds," Proc. ACM Symp. Applied Computing (SAC'11), pp. 1550-1557, 2011.
-
(2011)
Proc. ACM Symp. Applied Computing (SAC'11)
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
16
-
-
84861630520
-
LT Codes-Based Secure and Reliable Cloud Storage Service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, "LT Codes-Based Secure and Reliable Cloud Storage Service," Proc. IEEE INFOCOM, 2012.
-
(2012)
Proc. IEEE INFOCOM
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
17
-
-
84893594141
-
Certificateless Public Auditing for Data Integrity in the Cloud
-
B. Wang, B. Li, and H. Li, "Certificateless Public Auditing for Data Integrity in the Cloud," Proc. IEEE Conf. Comm. and Network Security (CNS'13), pp. 276-284, 2013.
-
(2013)
Proc. IEEE Conf. Comm. and Network Security (CNS'13)
, pp. 276-284
-
-
Wang, B.1
Li, B.2
Li, H.3
-
18
-
-
84861959172
-
Privacy-Preserving Public Auditing for Secure Cloud Storage
-
Feb.
-
C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
-
(2013)
IEEE Trans. Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
19
-
-
84883057189
-
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
-
B. Wang, B. Li, and H. Li, "Public Auditing for Shared Data with Efficient User Revocation in the Cloud," Proc. IEEE INFOCOM, pp. 2904-2912, 2013.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
20
-
-
84883057189
-
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
-
Dec.
-
B. Wang, B. Li, and H. Li, "Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud," IEEE Trans. Services Computing, 20 Dec. 2013, DOI: 10.1109/TSC.2013.2295611.
-
(2013)
IEEE Trans. Services Computing
, vol.20
-
-
Wang, B.1
Li, B.2
Li, H.3
-
22
-
-
84891354182
-
Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics
-
B. Wang, H. Li, and M. Li, "Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics," Proc. IEEE Int'l Conf. Comm. (ICC'13), pp. 539-543, 2013.
-
(2013)
Proc. IEEE Int'l Conf. Comm. (ICC'13)
, pp. 539-543
-
-
Wang, B.1
Li, H.2
Li, M.3
-
27
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'01), pp. 514-532, 2001.
-
(2001)
Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'01)
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
28
-
-
84946833891
-
How to Leak a Secret
-
R.L. Rivest, A. Shamir, and Y. Tauman, "How to Leak a Secret,"Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'01), pp. 552-565, 2001.
-
(2001)
Proc. Seventh Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT'01)
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
30
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,"Proc. IEEE INFOCOM, pp. 534-542, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
31
-
-
84877786210
-
Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud
-
June
-
X. Liu, Y. Zhang, B. Wang, and J. Yan, "Mona: Secure Multi- Owner Data Sharing for Dynamic Groups in the Cloud," IEEE Trans. Parallel and Distributed Systems, vol. 24, no. 6, pp. 1182-1191, June 2013.
-
(2013)
IEEE Trans. Parallel and Distributed Systems
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
Yan, J.4
-
33
-
-
70249129465
-
Scalable and Efficient Provable Data Possession
-
G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm'08), 2008.
-
(2008)
Proc. Fourth Int'l Conf. Security and Privacy in Comm. Networks (SecureComm'08)
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
|