-
1
-
-
84926629368
-
-
Wikipedia: Comparison of online backup services
-
Wikipedia: Comparison of online backup services http://en.wikipedia.org/wiki/Remote backup service.
-
-
-
-
2
-
-
84926684597
-
-
Dropbox Cloud Service:
-
Dropbox Cloud Service: http://www.dropbox.com/.
-
-
-
-
3
-
-
84926677222
-
-
Wuala:
-
Wuala:Wuala_http://www.wuala.com/.
-
-
-
-
5
-
-
78650053109
-
Side channels in cloud services, the case of deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg. Side channels in cloud services, the case of deduplication in cloud storage. IEEE Security and Privacy Magazine, special issue of Cloud Security, 2010.
-
(2010)
IEEE Security and Privacy Magazine, Special Issue of Cloud Security
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
6
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: ACM CCS’11: ACM conference on Computer and communications security, pages 491-500, 2011.
-
(2011)
ACM CCS’11: ACM Conference on Computer and Communications Security
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
7
-
-
84863932631
-
-
USENIX Security
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl. ıDark clouds on the horizon: Using cloud storage as attack vector and online slack space. In USENIX Security, 8 2011.
-
(2011)
Idark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space
, vol.8
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
8
-
-
84926658509
-
-
Dropbox left user accounts unlocked for 4 hours sunday
-
Dropbox left user accounts unlocked for 4 hours sunday http://www.wired.com/threatlevel/2011/06/dropbox/.
-
-
-
-
9
-
-
84926648150
-
-
Twitter: Tweetdeck
-
Twitter: Tweetdeck http://money.cnn.com/2012/03/30/technology/tweetdeck-bug-twitter/.
-
-
-
-
13
-
-
70350389843
-
-
In ESORICS’09, Springer-Verlag
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS’09, pages 355-370. Springer-Verlag, 2009.
-
(2009)
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
14
-
-
74049102823
-
-
In ACM CCS’07, ACM
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In ACM CCS’07, pages 598-609. ACM, 2007.
-
(2007)
Provable Data Possession at Untrusted Stores
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
15
-
-
79959823910
-
Remote data checking using provable data possession
-
ATENIESE, G., BURNS, R., CURTMOLA, R., HERRING, J., KHAN, O., KISSNER, L., PETERSON, Z., AND SONG, D. Remote data checking using provable data possession. ACM Transactions on Information and System Security (TISSEC), 14, 1 (2011), 12.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 12
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
And Song, D.8
-
17
-
-
67650314202
-
-
ToCS IV, LNCS, March
-
R. Elbaz, D. Champagne, C. Gebotys, R. B. Lee, N. Potlapally, and L. Torres. Hardware mechanisms for memory authentication: A survey of existing techniques and engines. ToCS IV, LNCS, pages 1-22, March 2009.
-
(2009)
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines
, pp. 1-22
-
-
Elbaz, R.1
Champagne, D.2
Gebotys, C.3
Lee, R.B.4
Potlapally, N.5
Torres, L.6
-
18
-
-
84969346266
-
-
CRYPTO’89, New York, NY, USA, Springer-Verlag New York, Inc
-
R. C. Merkle. A certified digital signature. ıIn Proceedings on Advances in cryptology, CRYPTO’89, pages 218-238, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
A Certified Digital Signature. Iin Proceedings on Advances in Cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
77951086610
-
Reed-solomon codes for low power communications
-
Apr 2008
-
Lionel Biard and Dominique Noguet. Reed-Solomon Codes for Low Power Communications. Journal of Communications, Vol 3, No 2 (2008), 13-21, Apr 2008.
-
(2008)
Journal of Communications
, vol.3
, Issue.2
, pp. 13-21
-
-
Biard, L.1
Noguet, D.2
-
20
-
-
84926648982
-
-
May 24-26, Dallas, Texas, United States
-
Funda Ergn, Sampath Kannan, S. Ravi Kumar, Ronitt Rubinfeld, Mahesh Viswanathan, Spot-checkers, Proceedings of the thirtieth annual ACM symposium on Theory of computing, p. 259-268, May 24-26, 1998, Dallas, Texas, United States
-
(1998)
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing
, pp. 259-268
-
-
Ergn, F.1
Kannan, S.2
Ravi Kumar, S.3
Rubinfeld, R.4
Viswanathan, M.5
-
21
-
-
57049120189
-
Proofs of retrievability: Theory and implementation
-
K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint.iacr.org/.
-
(2008)
Cryptology Eprint Archive, Report
, vol.2008
, Issue.175
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
22
-
-
51849117195
-
MR-PDP: Multiple- replica provable data possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, “MR-PDP: Multiple- Replica Provable Data Possession,” Proc. of ICDCS’08, pp. 411-420, 2008.
-
(2008)
Proc. Of ICDCS’08
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
23
-
-
84926650013
-
-
Crypto++ Library, 5.6.1, Jan
-
W. Dai. Crypto++ Library, 5.6.1, Jan, 2011. http://www.cryptopp.com/
-
(2011)
-
-
Dai, W.1
|