-
1
-
-
74049102823
-
Provable Data Possession at Untrusted Stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in Proc. CCS, 2007, pp. 598-609.
-
Proc. CCS, 2007
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
2
-
-
70249129465
-
Scalable and Efficient Provable Data Possession
-
G. Ateniese, R. DiPietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," in Proc. SecureComm, 2008, pp. 1-10.
-
Proc. SecureComm, 2008
, pp. 1-10
-
-
Ateniese, G.1
DiPietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
3
-
-
74049121230
-
Dynamic Provable Data Possession
-
C.C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in Proc. CCS, 2009, pp. 213-222.
-
Proc. CCS, 2009
, pp. 213-222
-
-
Erway, C.C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
4
-
-
46649083439
-
Efficient Remote Data Integrity Checking in Critical Information Infrastructures
-
Aug.
-
F. Sebé, J. Domingo-Ferrer, A. Martínez-Ballesté, Y. Deswarte, and J. Quisquater, "Efficient Remote Data Integrity Checking in Critical Information Infrastructures," IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1034-1038
-
-
Sebé, F.1
Domingo-Ferrer, J.2
Martínez-Ballesté, A.3
Deswarte, Y.4
Quisquater, J.5
-
5
-
-
84890471117
-
Proxy Provable Data Possession in Public Clouds
-
Oct./Dec. Available
-
H.Q. Wang. (2013, Oct./Dec.). Proxy Provable Data Possession in Public Clouds. IEEE Trans. Serv. Comput. [Online]. 6(4), pp. 551-559. Available: http://doi.ieeecomputersociety.org/10.1109/TSC.2012.35.
-
(2013)
IEEE Trans. Serv. Comput. [Online]
, vol.6
, Issue.4
, pp. 551-559
-
-
Wang, H.Q.1
-
6
-
-
84869466694
-
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage
-
Dec.
-
Y. Zhu, H. Hu, G.J. Ahn, and M. Yu, "Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2231-2244, Dec. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Zhu, Y.1
Hu, H.2
Ahn, G.J.3
Yu, M.4
-
7
-
-
78650008717
-
Efficient Provable Data Possession for Hybrid Clouds
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," in Proc. CCS, 2010, pp. 756-758.
-
Proc. CCS, 2010
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
Yau, S.S.6
-
8
-
-
51849117195
-
MR-PDP: Multiple-Replica Provable Data Possession
-
R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," in Proc. ICDCS, 2008, pp. 411-420.
-
Proc. ICDCS, 2008
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
9
-
-
84863642638
-
-
Centre Appl. Cryptogr. Res., Univ. Waterloo, Waterloo, ON, Canada, Rep. [Online]. Available
-
A.F. Barsoum and M.A. Hasan, "Provable possession and replication of data over cloud servers," Centre Appl. Cryptogr. Res., Univ. Waterloo, Waterloo, ON, Canada, Rep. 2010/32. [Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-32.pdf.
-
Provable Possession and Replication of Data over Cloud Servers
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
10
-
-
78650364292
-
A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability
-
Z. Hao and N. Yu, "A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability," in Proc. 2nd Int. Symp. Data, Privacy, E-Comm., 2010, pp. 84-89.
-
Proc. 2nd Int. Symp. Data, Privacy, E-Comm., 2010
, pp. 84-89
-
-
Hao, Z.1
Yu, N.2
-
11
-
-
84874296531
-
On verifying dynamic multiple data copies over cloud servers
-
Int. Assoc. Cryptol. Res., New York, NY, USA, [Online]. Available
-
A.F. Barsoum and M.A. Hasan, "On verifying dynamic multiple data copies over cloud servers," Int. Assoc. Cryptol. Res., New York, NY, USA, IACR eprint Rep. 447, 2011. [Online]. Available: http://eprint.iacr.org/2011/447.pdf.
-
(2011)
IACR Eprint Rep.
-
-
Barsoum, A.F.1
Hasan, M.A.2
-
12
-
-
74049103479
-
PORs: Proofs of Retrievability for Large Files
-
A. Juels and B.S. Kaliski, Jr., "PORs: Proofs of Retrievability for Large Files," in Proc. CCS, 2007, pp. 584-597.
-
Proc. CCS, 2007
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
13
-
-
58349118819
-
Compact Proofs of Retrievability
-
Proc. ASIACRYPT
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Proc. ASIACRYPT, vol. 5350, LNCS, 2008, pp. 90-107.
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
14
-
-
74049136395
-
Proofs of Retrievability: Theory and Implementation
-
K.D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," in Proc. CCSW, 2009, pp. 43-54.
-
Proc. CCSW, 2009
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
15
-
-
79952791500
-
Fair and Dynamic Proofs of Retrievability
-
Q. Zheng and S. Xu, "Fair and Dynamic Proofs of Retrievability," in Proc. CODASPY, 2011, pp. 237-248.
-
Proc. CODASPY, 2011
, pp. 237-248
-
-
Zheng, Q.1
Xu, S.2
-
16
-
-
70350681128
-
Proofs of Retrievability via Hardness Amplification
-
Proc. TCC
-
Y. Dodis, S. Vadhan, and D. Wichs, "Proofs of Retrievability via Hardness Amplification," in Proc. TCC, vol. 5444, LNCS, 2009, pp. 109-127.
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
17
-
-
79960836433
-
Zero-Knowledge Proofs of Retrievability
-
Aug.
-
Y. Zhu, H. Wang, Z. Hu, G.J. Ahn, and H. Hu, "Zero-Knowledge Proofs of Retrievability," Sci. Chin. Inf. Sci., vol. 54, no. 8, pp. 1608-1617, Aug. 2011.
-
(2011)
Sci. Chin. Inf. Sci.
, vol.54
, Issue.8
, pp. 1608-1617
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.J.4
Hu, H.5
-
18
-
-
77953295132
-
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in Proc. IEEE INFOCOM, Mar. 2010.
-
Proc. IEEE INFOCOM, Mar. 2010
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
19
-
-
79953294892
-
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
20
-
-
84861957968
-
Toward Secure and Dependable Storage Services in Cloud Computing
-
Apr./June
-
C. Wang, Q.Wang, K. Ren, N. Cao, and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Trans. Serv. Comput., vol. 5, no. 2, pp. 220-232, Apr./June 2012.
-
(2012)
IEEE Trans. Serv. Comput.
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
21
-
-
84878830854
-
Dynamic Audit Services for Outsourced Storages in Clouds
-
Apr./June Available
-
Y. Zhu, G.J. Ahn, H. Hu, S.S. Yau, H.G. An, and S. Chen. (2013, Apr./June). Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Serv. Comput. [Online]. 6(2), pp. 227-238. Available: http://doi.ieeecomputersociety.org/10.1109/TSC.2011.51.
-
(2013)
IEEE Trans. Serv. Comput. [Online]
, vol.6
, Issue.2
, pp. 227-238
-
-
Zhu, Y.1
Ahn, G.J.2
Hu, H.3
Yau, S.S.4
An, H.G.5
Chen, S.6
-
22
-
-
0003691180
-
-
Beijing, China: Publishing House of Electronics Industry
-
O. Goldreich, Foundations of Cryptography: Basic Tools. Beijing, China: Publishing House of Electronics Industry, 2003, pp. 194-195.
-
(2003)
Foundations of Cryptography: Basic Tools
, pp. 194-195
-
-
Goldreich, O.1
-
23
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Proc. CRYPTO
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," in Proc. CRYPTO, vol. 2139, LNCS, 2001, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
24
-
-
0035336179
-
New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
-
May
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New Explicit Conditions of Elliptic Curve Traces for FR-Reduction," IEICE Trans. Fundam., vol. E84A, no. 5, pp. 1234-1243, May 2001.
-
(2001)
IEICE Trans. Fundam.
, vol.E84A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
25
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
Proc. ASIACRYPT
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," in Proc. ASIACRYPT, vol. 2248, LNCS, 2001, pp. 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
26
-
-
77950413699
-
-
Ph.D. dissertation, Univ. London, London, U.K.
-
H.W. Lim, "On the Application of Identity-Based Cryptography in Grid Security," Ph.D. dissertation, Univ. London, London, U.K., 2006.
-
(2006)
On the Application of Identity-Based Cryptography in Grid Security
-
-
Lim, H.W.1
-
27
-
-
79952071204
-
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks
-
Apr.
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 4, pp. 673-686, Apr. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.4
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
28
-
-
75749102533
-
Attribute-Based on-Demand Multicast Group Setup with Membership Anonymity
-
Feb.
-
S. Yu, K. Ren, and W. Lou, "Attribute-Based on-Demand Multicast Group Setup with Membership Anonymity," Calc. Netw., vol. 54, no. 3, pp. 377-386, Feb. 2010.
-
(2010)
Calc. Netw.
, vol.54
, Issue.3
, pp. 377-386
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
29
-
-
23044435243
-
Efficient Implementation of Pairing-Based Cryptosystems
-
Sept.
-
P.S.L.M. Barreto, B. Lynn, and M. Scott, "Efficient Implementation of Pairing-Based Cryptosystems," J. Cryptol., vol. 17, no. 4, pp. 321-334, Sept. 2004.
-
(2004)
J. Cryptol.
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
32
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
July
-
D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures," J. Cryptol., vol. 13, no. 3, pp. 361-396, July 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
37
-
-
54249121607
-
-
Ph.D. dissertation, Stanford Univ., Stanford, CA, USA, [Online]. Available
-
B. Lynn, "On the implementation of pairing-based cryptosystems," Ph.D. dissertation, Stanford Univ., Stanford, CA, USA, 2008. [Online]. Available: http://crypto.stanford.edu/pbc/thesis.pdf.
-
(2008)
On the Implementation of Pairing-based Cryptosystems
-
-
Lynn, B.1
|