-
1
-
-
58349118819
-
Compact proofs of retrievability
-
Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: ASIACRYPT. (2008) 90-107.
-
(2008)
ASIACRYPT
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: CCS '07: ACM conference on Computer and communications security. (2007) 598-609.
-
(2007)
CCS '07: ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
9
-
-
60349120237
-
The complexity of online memory checking
-
1-2:46
-
Naor, M., Rothblum, G.N.: The complexity of online memory checking. J. ACM 56 (2009) 2:1-2:46.
-
(2009)
J. ACM
, vol.56
, pp. 2
-
-
Naor, M.1
Rothblum, G.N.2
-
10
-
-
78650828289
-
Constant -Size commitments to polynomials and their applications
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-Size Commitments to Polynomials and Their Applications. In: ASIACRYPT. (2010) 177-194.
-
(2010)
ASIACRYPT
, pp. 177-194
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
12
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: ICDCS '08: International Conference on Distributed Computing Systems. (2008) 411-420.
-
(2008)
ICDCS '08: International Conference on Distributed Computing Systems
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
13
-
-
74049121230
-
Dynamic provable data possession
-
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: CCS '09: ACM conference on Computer and communications security. (2009) 213-222.
-
(2009)
CCS '09: ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
16
-
-
70350389843
-
Enabling public veri-ability and data dynamics for storage security in cloud computing
-
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public veri-ability and data dynamics for storage security in cloud computing. In: ESORICS'09: European conference on Research in computer security. (2009) 355-370.
-
(2009)
ESORICS'09: European Conference on Research in Computer Security
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
17
-
-
77953295132
-
Privacy-Preserving public auditing for data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: IEEE INFOCOM. (2010) 525-533.
-
(2010)
IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
18
-
-
84856454856
-
Veri-able delegation of computation over large datasets
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Veri-able Delegation of Computation over Large Datasets. In: CRYPTO. (2011) 110.
-
(2011)
CRYPTO
, pp. 110
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
20
-
-
38149009170
-
Short signatures without random oracles and the sdh assumption in bilinear groups
-
Boneh, D., Boyen, X.: Short signatures without random oracles and the sdh assumption in bilinear groups. J. Cryptol. 21 (2008) 149-177.
-
(2008)
J. Cryptol.
, vol.21
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
21
-
-
74049102823
-
Provable data possession at untrusted stores
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. Cryptology ePrint Archive, Report 2007/202 (2007) http://eprint.iacr.org/.
-
(2007)
Cryptology EPrint Archive
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
|