-
1
-
-
84883057189
-
Public auditing for shared data with efficient user revocation in the cloud
-
B. Wang, B. Li, and H. Li. Public Auditing for Shared Data with Efficient User Revocation in the Cloud. Proc. IEEE INFOCOM: 2904-2912, 2013
-
(2013)
Proc. IEEE INFOCOM
, pp. 2904-2912
-
-
Wang, B.1
Li, B.2
Li, H.3
-
2
-
-
77950347409
-
A view of cloud computing
-
Apr
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. A View of Cloud Computing. Comm. ACM 53, no. 4: 50-58, Apr. 2010
-
(2010)
Comm. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable Data Possession at Untrusted Stores. Proc. 14th ACM Conf. Computer and Comm. Security (CCS-07): 598-610, 2007
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS-07)
, pp. 598-610
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
70350389843
-
Enabling public verifiability and data dynamic for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing. Proc. 14th European Conf. Research in Computer Security (ESORICS-09): 355-370, 2009
-
(2009)
Proc. 14th European Conf. Research in Computer Security (ESORICS-09
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
7
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. Proc. IEEE INFOCOM: 525-533, 2010
-
(2010)
Proc. IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
8
-
-
79959325063
-
Dynamic audit services for integrity verification of outsourced storages in clouds
-
Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds. Proc. ACM Symp. Applied Computing (SAC-11): 1550-1557, 2011
-
(2011)
Proc. ACM Symp. Applied Computing (SAC-11
, pp. 1550-1557
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
9
-
-
84861957968
-
Towards secure and dependable storage services in cloud computing
-
Jan
-
C. Wang, Q. Wang, K. Ren, and W. Lou. Towards Secure and Dependable Storage Services in Cloud Computing. IEEE Trans. Services Computing 5, no. 2: 220-232, Jan. 2012
-
(2012)
IEEE Trans. Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
84878830854
-
Dynamic audit services for outsourced storages in clouds
-
Apr.-June
-
Y. Zhu, G.-J. Ahn, H. Hu, S.S. Yau, H.G. An, and C.-J. Hu. Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Services Computing 6, no. 2: 227-238, Apr.-June 2013
-
(2013)
IEEE Trans. Services Computing
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Hu, C.-J.6
-
11
-
-
84861630520
-
Lt codes-based secure and reliable cloud storage service
-
N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou. LT Codes-Based Secure and Reliable Cloud Storage Service. Proc. IEEE INFOCOM: 693-701, 2012
-
(2012)
Proc. IEEE INFOCOM
, pp. 693-701
-
-
Cao, N.1
Yu, S.2
Yang, Z.3
Lou, W.4
Hou, Y.T.5
-
13
-
-
84890471117
-
Proxy provable data possession in public clouds
-
Oct.-Dec
-
H. Wang. Proxy Provable Data Possession in Public Clouds. IEEE Trans. Services Computing 6, no. 4: 551-559, Oct.-Dec. 2013
-
(2013)
IEEE Trans. Services Computing
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.1
-
14
-
-
84866761388
-
Oruta: Privacy-preserving public auditing for shared data in the cloud
-
B. Wang, B. Li, and H. Li. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud. Proc. IEEE CLOUD: 295-302, 2012
-
(2012)
Proc. IEEE CLOUD
, pp. 295-302
-
-
Wang, B.1
Li, B.2
Li, H.3
-
18
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir. How to Share a Secret. Comm. ACM. 22(11): 612-613, Nov. 1979
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
19
-
-
84891354182
-
Privacy-preserving public auditing for shared cloud data supporting group dynamics
-
June
-
B. Wang, H. Li, and M. Li. Privacy-Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics. Proc. IEEE Int-l Conf. Comm. (ICC-13): 1946-1950, June 2013
-
(2013)
Proc. IEEE Int-l Conf. Comm. (ICC-13
, pp. 1946-1950
-
-
Wang, B.1
Li, H.2
Li., M.3
-
21
-
-
79960878565
-
Findu: Private-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou. FindU: Private-Preserving Personal Profile Matching in Mobile Social Networks. Proc. IEEE INFOCOM: 2435-2443, 2011
-
(2011)
Proc. IEEE INFOCOM
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
23
-
-
84869476900
-
Hourglass schemes: How to prove that cloud files are encrypted
-
M. van Dijk, A. Juels, A. Oprea, R.L. Rivest, E. Stefanov, and N. Triandopoulos. Hourglass Schemes: How to Prove That Cloud Files are Encrypted. Proc. ACM Conf. Computer and Comm. Security (CCS-12): 265-280, 2012
-
(2012)
Proc. ACM Conf. Computer and Comm. Security (CCS-12
, pp. 265-280
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
Stefanov, E.5
Triandopoulos, N.6
-
24
-
-
84877786210
-
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
-
June
-
X. Liu, Y. Zhang, B. Wang, and J. Yan. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Parallel and Distributed Systems (TPDS-13) 24, no. 6: 1182-1191, June 2013
-
(2013)
IEEE Trans. Parallel and Distributed Systems (TPDS-13
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
Yan, J.4
|