-
1
-
-
85066533649
-
-
[Online]. Available
-
OpenSSL Project, (1998). [Online]. Available: http://www.openssl.org/
-
(1998)
-
-
-
3
-
-
85052022812
-
Dupless: Server-aided encryption for deduplicated storage
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Dupless: Server-aided encryption for deduplicated storage," in Proc. 22nd USENIX Conf. Sec. Symp., 2013, pp. 179-194.
-
Proc. 22nd USENIX Conf. Sec. Symp., 2013
, pp. 179-194
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
4
-
-
84883391608
-
Message-locked encryption and secure deduplication
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication," in Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013, pp. 296-312.
-
Proc. 32nd Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2013
, pp. 296-312
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
5
-
-
64249165649
-
Security proofs for identity-based identification and signature schemes
-
M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes," J. Cryptol., vol. 22, no. 1, pp. 1-61, 2009.
-
(2009)
J. Cryptol.
, vol.22
, Issue.1
, pp. 1-61
-
-
Bellare, M.1
Namprempre, C.2
Neven, G.3
-
6
-
-
84937408891
-
Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
M. Bellare and A. Palacio, "Gq and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks," in Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., 2002, pp. 162-177.
-
Proc. 22nd Annu. Int. Cryptol. Conf. Adv. Cryptol., 2002
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
7
-
-
80053596395
-
Twin clouds: An architecture for secure cloud computing
-
S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, "Twin clouds: An architecture for secure cloud computing," in Proc. Workshop Cryptography Security Clouds, 2011, pp. 32-44.
-
Proc. Workshop Cryptography Security Clouds, 2011
, pp. 32-44
-
-
Bugiel, S.1
Nurnberger, S.2
Sadeghi, A.3
Schneider, T.4
-
8
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, "Reclaiming space from duplicate files in a serverless distributed file system," in Proc. Int. Conf. Distrib. Comput. Syst., 2002, pp. 617-624.
-
Proc. Int. Conf. Distrib. Comput. Syst., 2002
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, D.4
Theimer, M.5
-
10
-
-
85066556265
-
-
[Online]. Available
-
GNU Libmicrohttpd, (2012). [Online]. Available: http://www.gnu.org/software/libmicrohttpd/
-
(2012)
-
-
-
11
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems," in Proc. ACM Conf. Comput. Commun. Security, 2011, pp. 491-500.
-
Proc. ACM Conf. Comput. Commun. Security, 2011
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
12
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
J. Li, X. Chen, M. Li, J. Li, P. Lee, and W. Lou, "Secure deduplication with efficient and reliable convergent key management,"in Proc. IEEE Trans. Parallel Distrib. Syst., http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.284, 2013.
-
(2013)
Proc. IEEE Trans. Parallel Distrib. Syst.
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.5
Lou, W.6
-
13
-
-
85066588933
-
-
[Online]. Available
-
libcurl, (1997). [Online]. Available: http://curl.haxx.se/libcurl/
-
(1997)
-
-
-
14
-
-
84883101404
-
Revdedup: A reverse deduplication storage system optimized for reads to latest backups
-
Apr.
-
C. Ng and P. Lee, "Revdedup: A reverse deduplication storage system optimized for reads to latest backups," in Proc. 4th Asia-Pacific Workshop Syst., http://doi.acm.org/10.1145/2500727.2500731, Apr. 2013.
-
(2013)
Proc. 4th Asia-Pacific Workshop Syst.
-
-
Ng, C.1
Lee, P.2
-
15
-
-
84863584951
-
Private data deduplication protocols in cloud storage
-
W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage," in Proc. 27th Annu. ACM Symp. Appl. Comput., 2012, pp. 441-446.
-
Proc. 27th Annu. ACM Symp. Appl. Comput., 2012
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
-
16
-
-
84871949666
-
Boosting efficiency and security in proof of ownership for deduplication
-
R. D. Pietro and A. Sorniotti, "Boosting efficiency and security in proof of ownership for deduplication," in Proc. ACM Symp. Inf., Comput. Commun. Security, 2012, pp. 81-82.
-
Proc. ACM Symp. Inf., Comput. Commun. Security, 2012
, pp. 81-82
-
-
Pietro, R.D.1
Sorniotti, A.2
-
18
-
-
80155161434
-
A secure cloud backup system with assured deletion and version control
-
A. Rahumed, H. C. H. Chen, Y. Tang, P. P. C. Lee, and J. C. S. Lui, "A secure cloud backup system with assured deletion and version control," in Proc. 3rd Int. Workshop Secutiry Cloud Comput., 2011, pp. 160-167.
-
Proc. 3rd Int. Workshop Secutiry Cloud Comput., 2011
, pp. 160-167
-
-
Rahumed, A.1
Chen, H.C.H.2
Tang, Y.3
Lee, P.P.C.4
Lui, J.C.S.5
-
19
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
20
-
-
84922456743
-
A secure data deduplication scheme for cloud storage
-
Zurich, ZUR1308-022
-
J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl, "A secure data deduplication scheme for cloud storage," Tech. Rep. IBM Research, Zurich, ZUR 1308-022, 2013.
-
(2013)
Tech. Rep. IBM Research
-
-
Stanek, J.1
Sorniotti, A.2
Androulaki, E.3
Kencl, L.4
-
21
-
-
70349237760
-
Secure data deduplication
-
M. W. Storer, K. Greenan, D. D. E. Long, and E. L. Miller, "Secure data deduplication," in Proc. 4th ACM Int. Workshop Storage Security Survivability, 2008, pp. 1-10.
-
Proc. 4th ACM Int. Workshop Storage Security Survivability, 2008
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.E.3
Miller, E.L.4
-
23
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
J. Xu, E.-C. Chang, and J. Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage," in Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, 2013, pp. 195-206.
-
Proc. 8th ACM SIGSAC Symp. Inform., Comput. Commun. Security, 2013
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
24
-
-
84901643136
-
Secure and constant cost public cloud storage auditing with deduplication
-
J. Yuan and S. Yu, "Secure and constant cost public cloud storage auditing with deduplication," IACR Cryptology ePrint Archive, 2013:149, 2013.
-
(2013)
IACR Cryptology ePrint Archive
, vol.2013
, pp. 149
-
-
Yuan, J.1
Yu, S.2
-
25
-
-
80755169468
-
Sedic: Privacy-aware data intensive computing on hybrid clouds
-
K. Zhang, X. Zhou, Y. Chen, X. Wang, and Y. Ruan, "Sedic: Privacy-aware data intensive computing on hybrid clouds," in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 515-526.
-
Proc. 18th ACM Conf. Comput. Commun. Security, 2011
, pp. 515-526
-
-
Zhang, K.1
Zhou, X.2
Chen, Y.3
Wang, X.4
Ruan, Y.5
|